Abstract
In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, ICFNDS 2019 |
| Publisher | Association for Computing Machinery |
| ISBN (Electronic) | 9781450371636 |
| DOIs | |
| State | Published - 1 Jul 2019 |
| Externally published | Yes |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|
Bibliographical note
Publisher Copyright:© 2019 Association for Computing Machinery.
Keywords
- Cloud computing security
- Fully homomorphic encryption
- Multi-agent system
- Order preserving encryption
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'An intelligent cloud data protection technique based on multi agent system using advanced cryptographic algorithms'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver