A new lightweight data security system for data security in the cloud computing
In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and stored in secure areas. Cloud computing is the technology that can be used to store thes...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-10-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2665917423001927 |
_version_ | 1797682775434723328 |
---|---|
author | Shameer Mohammed S. Nanthini N. Bala Krishna Inumarthi V. Srinivas Manikandan Rajagopal M. Ashok Kumar |
author_facet | Shameer Mohammed S. Nanthini N. Bala Krishna Inumarthi V. Srinivas Manikandan Rajagopal M. Ashok Kumar |
author_sort | Shameer Mohammed |
collection | DOAJ |
description | In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and stored in secure areas. Cloud computing is the technology that can be used to store these massive data sets. The article suggests a Cloud-based Data Security System (C-DSS) that employs a five-tiered trust model for cloud-edge data-sharing architectures. The data owner can select an appropriate trust level and Cyber Threat Information (CTI) sanitization procedure before releasing CTI for analytic strategy. In addition, this cleansing method is conducted either by an end device or by the cloud service supplier, based on the organization's degree of confidence in latter. Research presents the trust architecture, cloud architecture, and installation methodology, all of which are intended to meet widest variety of needs for exchanging secret CTI information. The testing findings high degree of data security and an evident improvement in terms of cypher processing time and security services when compared to the encryption systems that are most often employed in cloud technology. In conclusion, research briefly outlines development and evaluation performed so far by pilot applications confirming the architecture. |
first_indexed | 2024-03-12T00:04:48Z |
format | Article |
id | doaj.art-0d7badc6f7a0479c803ea1163510e6b1 |
institution | Directory Open Access Journal |
issn | 2665-9174 |
language | English |
last_indexed | 2024-03-12T00:04:48Z |
publishDate | 2023-10-01 |
publisher | Elsevier |
record_format | Article |
series | Measurement: Sensors |
spelling | doaj.art-0d7badc6f7a0479c803ea1163510e6b12023-09-17T04:57:24ZengElsevierMeasurement: Sensors2665-91742023-10-0129100856A new lightweight data security system for data security in the cloud computingShameer Mohammed0S. Nanthini1N. Bala Krishna2Inumarthi V. Srinivas3Manikandan Rajagopal4M. Ashok Kumar5University of Technology and Applied Sciences Sur, Oman; Corresponding author.AP(SG), Department of AI & DS, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Science, Thandalam, Chennai, IndiaDepartment of CSE, Mohan Babu University &SreeVidyanikethan Engineering College, Tirupati, 517102, Andhrapradesh, IndiaK.J. Somaiya Institute of ManagementData Science and Technology Dept, Vidya Nagar, Vidya vihar (East), Mumbai, 400077, IndiaSchool of Business and Management, Christ University, Bangalore, 560029, IndiaFaculty of Computer Science, Department of Computer Science and Software Engineering, Skyline University Nigeria,Kano, NigeriaIn recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and stored in secure areas. Cloud computing is the technology that can be used to store these massive data sets. The article suggests a Cloud-based Data Security System (C-DSS) that employs a five-tiered trust model for cloud-edge data-sharing architectures. The data owner can select an appropriate trust level and Cyber Threat Information (CTI) sanitization procedure before releasing CTI for analytic strategy. In addition, this cleansing method is conducted either by an end device or by the cloud service supplier, based on the organization's degree of confidence in latter. Research presents the trust architecture, cloud architecture, and installation methodology, all of which are intended to meet widest variety of needs for exchanging secret CTI information. The testing findings high degree of data security and an evident improvement in terms of cypher processing time and security services when compared to the encryption systems that are most often employed in cloud technology. In conclusion, research briefly outlines development and evaluation performed so far by pilot applications confirming the architecture.http://www.sciencedirect.com/science/article/pii/S2665917423001927Data securityCyber securityCloud computingCyber threats |
spellingShingle | Shameer Mohammed S. Nanthini N. Bala Krishna Inumarthi V. Srinivas Manikandan Rajagopal M. Ashok Kumar A new lightweight data security system for data security in the cloud computing Measurement: Sensors Data security Cyber security Cloud computing Cyber threats |
title | A new lightweight data security system for data security in the cloud computing |
title_full | A new lightweight data security system for data security in the cloud computing |
title_fullStr | A new lightweight data security system for data security in the cloud computing |
title_full_unstemmed | A new lightweight data security system for data security in the cloud computing |
title_short | A new lightweight data security system for data security in the cloud computing |
title_sort | new lightweight data security system for data security in the cloud computing |
topic | Data security Cyber security Cloud computing Cyber threats |
url | http://www.sciencedirect.com/science/article/pii/S2665917423001927 |
work_keys_str_mv | AT shameermohammed anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT snanthini anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT nbalakrishna anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT inumarthivsrinivas anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT manikandanrajagopal anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT mashokkumar anewlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT shameermohammed newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT snanthini newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT nbalakrishna newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT inumarthivsrinivas newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT manikandanrajagopal newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing AT mashokkumar newlightweightdatasecuritysystemfordatasecurityinthecloudcomputing |