A Robust Information Security Model for Cloud Computing Based on the Scrambling Algorithm and Multi-Level Encryption
Proceeding: The International Conference on Computing Technology and Information Management (ICCTIM)Publication Date: 2014-04-09
Authors : Mohammad V. Malakooti; Nilofar Mansourzadeh;
Page : 411-416
Keywords : Cloud computing; Data Security; Data Integrity and Availability; Depsky Model; Bioemtric;
Abstract
Many companies use cloud computing for their storage purposes to get benefit of using cloud environment to decrease the cost and accessibility of the data. When we store our data over the cloud environment, to obtain the low cost storage, we will lose the control over our data and certain type of security as well as different levels of security should be applied depend upon the type of data. The applied security will protect our data from intruder and hacker even though they obtained our data accidentally or intentionally. There are various forms of security algorithm and models that can be used to protect our stored data over distributed networks and cloud environment. The method that we have proposed is based on the scrambling algorithm and multilevel encryptions. We have designed, implemented, and tested our security model on the image type of information that is going to be stored on the cloud environment. Our model can be modified and expanded to apply security on the multimedia information, real time video and movies that are going to be stored on the cloud servers. In addition, we have presented a new model based on multi-cloud distributed system, in which the specified information will be divided in to N different segments and each segment will be stored on one cloud server to prevent hacker from accessing the entire information. This process will apply higher level of security even the information is already scrambled and encrypted.
Other Latest Articles
- A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
- Comparative Study on Service-Oriented Architecture and Event-Driven Architecture
- Microblogging Opinion Mining Approach for Kuwaiti Dialect
- Simulation of an RF MEMS Double-Pole Double-Throw Switch Using Novel Seesaw Design
- Detecting Attacks in Wireless Sensor Network Using Genetic Algorithms
Last modified: 2014-04-14 18:12:59