Secured cloud storage for strategic applications - A case study

T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi
{"title":"Secured cloud storage for strategic applications - A case study","authors":"T. Aravindh, S. Chander, R. Rukmani, G. Kalaichelvi","doi":"10.1109/ICOAC.2014.7229728","DOIUrl":null,"url":null,"abstract":"Using the cloud to store data relevant to strategic applications is restricted due to the presence of several security threats. The embedded system used to drive the strategic application has some hardware limitations, confining the necessary computation required to secure the data to be stored in the cloud. So a methodology known as S-CEM proposed in this paper is implemented which not only secures the data to be stored in the cloud, but also reduces the overall computation required by encrypting critical data and leaving out non-critical data which is less significant. The S-CEM technique suggested for an embedded system in this paper ensures the confidentiality of data and preserves the privacy of the user through a unique management of data hosted in the cloud using partitioning and cryptography. This method also ensures the data security on the fly through the application of combining, scrambling technique along with encrypting using Data Encryption Standard (DES). This method is analyzed for its efficiency of time and the volume of data storage.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Sixth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2014.7229728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Using the cloud to store data relevant to strategic applications is restricted due to the presence of several security threats. The embedded system used to drive the strategic application has some hardware limitations, confining the necessary computation required to secure the data to be stored in the cloud. So a methodology known as S-CEM proposed in this paper is implemented which not only secures the data to be stored in the cloud, but also reduces the overall computation required by encrypting critical data and leaving out non-critical data which is less significant. The S-CEM technique suggested for an embedded system in this paper ensures the confidentiality of data and preserves the privacy of the user through a unique management of data hosted in the cloud using partitioning and cryptography. This method also ensures the data security on the fly through the application of combining, scrambling technique along with encrypting using Data Encryption Standard (DES). This method is analyzed for its efficiency of time and the volume of data storage.
战略应用的安全云存储——一个案例研究
由于存在几种安全威胁,使用云存储与战略应用程序相关的数据受到限制。用于驱动战略应用程序的嵌入式系统有一些硬件限制,限制了保护存储在云中的数据所需的必要计算。因此,本文提出了一种称为S-CEM的方法,该方法不仅可以保护存储在云中的数据,还可以通过加密关键数据并省略不太重要的非关键数据来减少所需的总体计算。本文提出的用于嵌入式系统的S-CEM技术确保了数据的机密性,并通过使用分区和加密技术对托管在云中的数据进行独特的管理来保护用户的隐私。该方法通过组合置乱技术和数据加密标准DES (data Encryption Standard)加密技术的应用,保证了动态数据的安全性。分析了该方法的时间效率和数据存储量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信