T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi
{"title":"Secured cloud storage for strategic applications - A case study","authors":"T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi","doi":"10.1109/ICOAC.2014.7229728","DOIUrl":null,"url":null,"abstract":"Using the cloud to store data relevant to strategic applications is restricted due to the presence of several security threats. The embedded system used to drive the strategic application has some hardware limitations, confining the necessary computation required to secure the data to be stored in the cloud. So a methodology known as S-CEM proposed in this paper is implemented which not only secures the data to be stored in the cloud, but also reduces the overall computation required by encrypting critical data and leaving out non-critical data which is less significant. The S-CEM technique suggested for an embedded system in this paper ensures the confidentiality of data and preserves the privacy of the user through a unique management of data hosted in the cloud using partitioning and cryptography. This method also ensures the data security on the fly through the application of combining, scrambling technique along with encrypting using Data Encryption Standard (DES). This method is analyzed for its efficiency of time and the volume of data storage.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Sixth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2014.7229728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Using the cloud to store data relevant to strategic applications is restricted due to the presence of several security threats. The embedded system used to drive the strategic application has some hardware limitations, confining the necessary computation required to secure the data to be stored in the cloud. So a methodology known as S-CEM proposed in this paper is implemented which not only secures the data to be stored in the cloud, but also reduces the overall computation required by encrypting critical data and leaving out non-critical data which is less significant. The S-CEM technique suggested for an embedded system in this paper ensures the confidentiality of data and preserves the privacy of the user through a unique management of data hosted in the cloud using partitioning and cryptography. This method also ensures the data security on the fly through the application of combining, scrambling technique along with encrypting using Data Encryption Standard (DES). This method is analyzed for its efficiency of time and the volume of data storage.