New Security Approach of Confidential Resources in Hybrid Clouds

Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers. 





References:
[1] J. Liu, Q. Zhang, and H. Chen, “The Characteristics of Cloud
Computing,” IEEE 39th International conf. Parallel Processing
Workshops. San Diego CA, pp. 275-279, September 2010.
[2] M. Zhou, R. Zhang, D.Zeng, and W. Qian, “Services in the Cloud
Computing era: A survey,” IEEE 4th International Universal
Communication Symposium. Beijing CHINA, pp. 40-46, October 2010.
[3] K. Jasem Mohammad Omar, S. Abbas, M. El-Sayed El-Horbaty, and M.
Abdel-Badeeh Salem, “A comparative study between modern encryption
algorithms based on cloud computing environment,” IEEE 8th
International Conference for Internet Technology and Secured
Transactions. London, United Kingdom, pp. 531-535, December 2013.
[4] C.P. Gupta, and I. Sharma, “A fully homomorphic encryption scheme
with symmetric keys with application to private data processing in
clouds,” IEEE Fourth International Conference on the Network of the
Future. Pohang, p. 1-4, October 2013.
[5] M. Zhou, R. Zhang, W. Xie, W. Qian, and A.Zhou, “Security and
Privacy in Cloud Computing: A Survey,” IEEE Sixth International
Conference on Semantics Knowledge and Grid. Beijing, pp. 105-112,
November 2010.
[6] DropBox, “Privacy Policy” https://www.dropbox.com/en/privacy
published 2015-02-13.
[7] D. Sheng, D. Kondo, and F. Cappello, “Characterizing Cloud
Applications on a Google Data Center,” IEEE 42nd International
Conference on Parallel Processing. Lyon, pp. 468-473, October 2013.
[8] Microsoft, “Windows Azure Privacy Overview”
http://download.microsoft.com/download/1/6/0/160216AA-8445-480BB60F-5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf
[9] M. Mohamed. Eman, H. S. Abdelkader, S. El-Etriby, “Data Security
Model For Cloud Computing,” The Twelfth International Conference on
Networks. Seville, pp. 66-74, January 2013.
[10] A.S.R. Armel, and V. Thavavel, “Ghost encryption: Mobile data security
model encrypting data before moving it to the cloud service provider,”
IEEE Fifth International Conference on Advanced Computing. Chennai,
pp. 512-516, December 2013.