Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3090354.3090404acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Securing Data in Cloud Computing by Classification

Published: 29 March 2017 Publication History

Abstract

Cloud computing is a wide architecture based on diverse models for providing different services of software and hardware. Cloud computing paradigm attracts different users because of its several benefits such as high resource elasticity, expense reduction, scalability and simplicity which provide significant preserving in terms of investment and work force. However, the new approaches introduced by the cloud, related to computation outsourcing, distributed resources, multi-tenancy concept, high dynamism of the model, data warehousing and the nontransparent style of cloud increase the security and privacy concerns and makes building and handling trust among cloud service providers and consumers a critical security challenge. This paper proposes a new approach to improve security of data in cloud computing. It suggests a classification model to categorize data before being introduced into a suitable encryption system according to the category. Since data in cloud has not the same sensitivity level, encrypting it with the same algorithms can lead to a lack of security or of resources. By this method we try to optimize the resources consumption and the computation cost while ensuring data confidentiality.

References

[1]
P. Mell, T. Grance, The NIST definition of cloud computing, 2011, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg
[2]
Hussain, S. A., Fatima, M., Saees, A., Raza, I., Shahzad, R. K., Multilevel Classification of Security Concerns in Cloud Computing, Applied Computing and Informatics (2016).
[3]
Ashish Singh and Kakali Chatterjee, Cloud security issues and challenges: asurvey, Journal of Network and Computer Applications.
[4]
Danan Thilakanathan, Shiping Chen, Surya Nepal, Rafael A. Calvo: Secure data sharing in the Cloud, Book Chapter on Security, Privacy, and Trust in Cloud Systems, by Springer (2013)
[5]
Talal H. Noor; Quan Z. Sheng; Zakaria Maamar; Sherali Zeadally, Managing Trust in the Cloud: State of the Art and Research Challenges, IEEE 2016, Computer Volume: 49, Issue: 2, Feb. 2016 pp:34--45
[6]
K. Barker, et al., A Data Privacy Taxonomy, Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier, Vol. 5588, Springer-Verlag, Birmingham, 2009, pp. 42--54.
[7]
Bruce Schneier, A Taxonomy of Social Networking Data, The IEEE Computer And Reliability Societies, August 2010.
[8]
Y. Park, W. Teiken, J.R. Rao, S.N. Chari, Data classification and sensitivity estimation for critical asset discovery, IBM J. RES & DEV. vl. 60 no. 4 paper 2 july/august 2016
[9]
Rizwana Shaikh and M. Sasikumar, Procedia Computer Science 45 (2015) 493--498
[10]
Donizetti Zorzo, S., Pereira Botelho, R. and Muniz de Ávila, P. (2013) Taxonomy for Privacy Policies of Social Networks Sites. Social Networking, 2, 157--164.
[11]
M. Shakir, A. Abubakar, Y. Yousoff, M. Waseem, M. Al-Emran, Model of security level classification for data in hybrid cloud computing, journal of theoretical and applied information, december 2016. vol.94. no.1

Cited By

View all
  • (2020)SEVA: Secure E-Voting Application in Cyber Physical SystemCyber-Physical Systems10.1080/23335777.2020.18372508:1(1-31)Online publication date: 12-Nov-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
March 2017
685 pages
ISBN:9781450348522
DOI:10.1145/3090354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Classification
  2. Cloud Computing
  3. Cloud Storage
  4. Data Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDCA'17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)SEVA: Secure E-Voting Application in Cyber Physical SystemCyber-Physical Systems10.1080/23335777.2020.18372508:1(1-31)Online publication date: 12-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media