AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT
PDF

Keywords

Cloud Computing
data security
encryption
data migration
virtual machines

How to Cite

Shakya, Subarna. 2019. “AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT”. Journal of Artificial Intelligence and Capsule Networks 1 (1): 45-53. https://doi.org/10.36548/jaicn.2019.1.006.

Abstract

Cloud computing is advantageous in several applications. Data migration is constantly carried out to hybrid or public cloud. Certain large enterprises will not move their business-critical data and applications to the cloud. This is due to the concerns regarding data security and privacy protection. In this paper, we provide a data security analysis and solution for privacy protection framework during data migration. A Secure Socket Layer (SSL) is established and migration tickets with minimum privilege is introduced. Further, data encryption is done using Prediction Based Encryption (PBE). This system will be of use for healthcare systems and e-commerce systems that can store data regarding credit card details. We provide a strict separation between sensitive and non-sensitive data and provide encryption for the sensitive data.

PDF

References

Ogunde, Nicholas A., and Jörn Mehnen. "Factors affecting cloud technology adoption: potential user’s perspective." In Cloud Manufacturing, pp. 77-98. Springer, London, 2013.

Piao, Jing Tai, and Jun Yan. "A network-aware virtual machine placement and migration approach in cloud computing." In 2010 Ninth International Conference on Grid and Cloud Computing, pp. 87-92. IEEE, 2010.

Kaufman, Lori M. "Data security in the world of cloud computing." IEEE Security & Privacy 7, no. 4 (2009): 61-64.

Perez, Ronald, Reiner Sailer, and Leendert van Doorn. "vTPM: virtualizing the trusted platform module." In Proc. 15th Conf. on USENIX Security Symposium, pp. 305-320. 2006.

Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34, no. 1 (2011): 1-11.

Watson, Michael R., Angelos K. Marnerides, Andreas Mauthe, and David Hutchison. "Malware detection in cloud computing infrastructures." IEEE Transactions on Dependable and Secure Computing 13, no. 2 (2015): 192-205.

Karnwal, Tarun, T. Sivakumar, and G. Aghila. "A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack." In 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science, pp. 1-5. IEEE, 2012.

Choo, Kim-Kwang Raymond. "Cloud computing: challenges and future directions." Trends and Issues in Crime and Criminal justice 400 (2010): 1.

Kazim, Muhammad, and Shao Ying Zhu. "A survey on top security threats in cloud computing." (2015).

Kushwah, Virendra Singh, and Aradhana Saxena. "A security approach for data migration in cloud computing." International Journal of Scientific and Research Publications 3, no. 5 (2013): 1-9.

Rosado, David G., Rafael Gómez, Daniel Mellado, and Eduardo Fernández-Medina. "Security analysis in the migration to cloud environments." Future Internet 4, no. 2 (2012): 469-487.

Johnson, Bjorn, and Yanzhen Qu. "A holistic model for making cloud migration decision: A consideration of security, architecture and business economics." In 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications, pp. 435-441. IEEE, 2012.

Michalas, Antonis, Nicolae Paladi, and Christian Gehrmann. "Security aspects of e-health systems migration to the cloud." In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 212-218. IEEE, 2014.

Chen, Deyan, and Hong Zhao. "Data security and privacy protection issues in cloud computing." In 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647-651. IEEE, 2012.

Babu, G. Prasad, and A. K. Tiwari. "Energy Efficient Scheduling Algorithm for Cloud Computing Systems Based on Prediction Model." International Journal of Advanced Networking and Applications 10, no. 5 (2019): 4013-4018.

Beloglazov, Anton, and Rajkumar Buyya. "Energy efficient allocation of virtual machines in cloud data centers." In 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577-578. IEEE, 2010.

Chen, Deyan, and Hong Zhao. "Data security and privacy protection issues in cloud computing." In 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647-651. IEEE, 2012.

Xiao, Zhifeng, and Yang Xiao. "Security and privacy in cloud computing." IEEE communications surveys & tutorials 15, no. 2 (2012): 843-859.