2015 5th Nirma University International Conference on Engineering (NUiCONE) 2015
DOI: 10.1109/nuicone.2015.7449636
|View full text |Cite
|
Sign up to set email alerts
|

EncryScation: A novel framework for cloud IaaS, DaaS security using encryption and Obfuscation techniques

Abstract: Now a days every industry needs more income with less investment behind infrastructure. Here, the new era of Cloud computing comes where the user can have everything on rent and "pay as go" fundamental. Cloud users are able to store their valuable data on Cloud premises and make themselves free from local burden. While users data is available on Cloud servers, it is very important for the user that data must be secure when it is in transition and even after it has been stored on server. Most of the researchers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Encryption is carried out on the alphanumeric characters and the alphanumeric data type, and the numeric type is obfuscated only [21]. Specifically, encryption helps the user to provide confidentiality for his data when it is transmitted over the network, and data jamming helps the service provider secure the user's data in rest mode [22]. This model provides an enhancement in data confidentiality.…”
Section: Existing Solutions To Secure the Cloudmentioning
confidence: 99%
“…Encryption is carried out on the alphanumeric characters and the alphanumeric data type, and the numeric type is obfuscated only [21]. Specifically, encryption helps the user to provide confidentiality for his data when it is transmitted over the network, and data jamming helps the service provider secure the user's data in rest mode [22]. This model provides an enhancement in data confidentiality.…”
Section: Existing Solutions To Secure the Cloudmentioning
confidence: 99%
“…This problem mainly occurred in the wireless network directly communicate the request through the centralized server without any auditing. The cloud agent providers access the data services security to obtain the protocols by inter cloud representation [19]. The adaptive concession rate (ACR) and minimal sufficient concession (MSC) both the method are to negotiate the security rule [20].…”
Section: Related Workmentioning
confidence: 99%
“…Another approach is to combine Encryption and Obfuscation [18,19]. Encryption is done on alphabets and alphanumeric type of data, and obfuscation only to the numeric type of data [18].…”
Section: Existing Solutions and Prior Workmentioning
confidence: 99%
“…Encryption is done on alphabets and alphanumeric type of data, and obfuscation only to the numeric type of data [18]. Specifically, encryption helps a user to provide secrecy to its data when it is transferred in the network, and data obfuscation helps the service provider to secure the user's data at rest [19]. This model provides an improvement of data confidentiality.…”
Section: Existing Solutions and Prior Workmentioning
confidence: 99%