The Proposed Model to Increase Security of Sensitive Data in Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 2
Abstract
There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.
Authors and Affiliations
Dhuratë Hyseni, Besnik Selimi, Artan Luma, Betim Cico
Constraints in the IoT: The World in 2020 and Beyond
The Internet of Things (IoT), often referred as the future Internet; is a collection of interconnected devices integrated into the world-wide network that covers almost everything and could be available anywhere. IoT is...
Using the Technology Acceptance Model in Understanding Academics’ Behavioural Intention to Use Learning Management Systems
Although e-learning is in its infancy in Saudi Arabia, most of the public universities in the country show a great interest in the adoption of learning and teaching tools. Determining the significance of a particular too...
An Extension of the Bisection Theorem to Symmetrical Circuits with Cross-Coupling
This paper demonstrates that the bisection theorem can be applied to the differential and common-mode analysis of balanced symmetrical circuits with cross coupling. This class of circuits is often found in the literature...
Low Complexity for Scalable Video Coding Extension of H.264 based on the Complexity of Video
Scalable Video Coding (SVC) / H.264 is one type of video compression techniques. Which provided more reality in dealing with video compression to provide an efficient video coding based on H.264/AVC. This ensures higher...
Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning
This paper presents a new framework for adding semantics into e-learning system. The proposed approach relies on two principles. The first principle is the automatic addition of semantic information when creating t...