An intelligent cloud data protection technique based on multi agent system using advanced cryptographic algorithms

  • Mohammed Amine Yagoub
  • , Abdelkader Laouid
  • , Ahcène Bounceur
  • , Muath Alshaikh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Future Networks and Distributed Systems, ICFNDS 2019
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450371636
DOIs
StatePublished - 1 Jul 2019
Externally publishedYes

Publication series

NameACM International Conference Proceeding Series

Bibliographical note

Publisher Copyright:
© 2019 Association for Computing Machinery.

Keywords

  • Cloud computing security
  • Fully homomorphic encryption
  • Multi-agent system
  • Order preserving encryption

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An intelligent cloud data protection technique based on multi agent system using advanced cryptographic algorithms'. Together they form a unique fingerprint.

Cite this