ebook img

Privacy and Security Challenges in Cloud Computing PDF

293 Pages·2022·13.414 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Privacy and Security Challenges in Cloud Computing

Privacy and Security Challenges in Cloud Computing Cognitive Approaches in Cloud and Edge Computing Series Editors: Niranjanamurthy M and Ramiz Aliguliyev Privacy and Security Challenges in Cloud Computing A Holistic Approach T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, and M. Niranjanamurthy Ethics in Information Technology A Practical Guide Gajanan K. Awari and Sarvesh V. Warjurkar For more information about this series, please visit: www.routledge.com/ Cognitive-Approaches-in-Cloud-and-Edge-Computing/book-series/CACAEC Privacy and Security Challenges in Cloud Computing A Holistic Approach Edited by T. Ananth Kumar T. S. Arun Samuel R. Dinesh Jackson Samuel M. Niranjanamurthy First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2022 selection and editorial matter, T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel and M. Niranjanamurthy; individual chapters, the contributors CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and pub- lisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978-1-032-11355-5 (hbk) ISBN: 978-1-032-11426-2 (pbk) ISBN: 978-1-003-21988-0 (ebk) DOI: 10.1201/9781003219880 Typeset in Times by codeMantra Contents Preface......................................................................................................................vii Editors .......................................................................................................................xi Contributors ...........................................................................................................xiii Chapter 1 Security-Enhanced Cloud for Serverless Computing and Its Applications .....................................................................................1 L. Jerart Julus and Krishnan Ayyappan Chapter 2 Revealing the Web of Cloud Computing: Threats and Vulnerabilities ....................................................................................17 M. Satheesh Kumar, Jalel Ben-Othman, B. Sheik Mohamed, and A. Shenbagavalli Chapter 3 Security and Privacy Provocation of Data in Cloud Computing .......35 D. Prabakaran, K. Suresh Kumar, and R. Senthil Kumaran Chapter 4 Networking Security Incitements in Cloud Computing .....................59 S. Maheswari, A. Ramathilagam, and R. Ramani Chapter 5 Security Concerns of Virtualization in Cloud Computing ................81 Darshana A. Naik, G. Shruthi, A. Ashwitha, and Pramod Sunagar Chapter 6 Operational Security Agitations in Cloud Computing .....................101 N. Nithiyanandam, S.P. Priyadharshini, G. Fathima, and S. Jeyapriyanga Chapter 7 Secure Data Storage and Retrieval Operations Using Attribute- Based Encryption for Mobile Cloud Computing .............................123 S. Usharani, K. Dhanalakshmi, P. Manju Bala, R. Rajmohan, and S. Jayalakshmi v vi Contents Chapter 8 Deep Dive on Popular Security Models and Strategies of Cloud Computing .............................................................................147 K. Venkatesh, R. Velvizhi, K. Selva Banu Priya, and N. Sivaranjani Chapter 9 Quantum Computing and Quantum Cryptography .........................171 B. Sheik Mohamed, M. Satheesh Kumar, and K.G. Srinivasagan Chapter 10 An Extensive Exploration of Privacy and Compliance Considerations for Hybrid Cloud Deployments ...............................191 P. Hemalatha, W.T. Chembian, A. Ranjith Kumar, S. Ramesh, and B. Jegajothi Chapter 11 Threat Detection and Incident Response in Cloud Security ............207 Satheeshkumar Rajendran, A. Valarmathi, and M. Satheesh Kumar Chapter 12 The Cyber Artificial Intelligence Platform for Cloud Security .......229 P. Manju Bala, S. Usharani, R. Rajmohan, S. Jayalakshmi, and P. Divya Chapter 13 Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments .........................257 Hamid Ali Abed A L-Asadi and Amer S. Elameer Index ......................................................................................................................273 Preface Data security has been a significant issue in the IT field consistently. In the cloud computing environment, it becomes particularly severe because data are located in different locations even across the globe. This book discusses a comparative research analysis of existing research on data security and operational security agi- tations in cloud computing. The book provides readers with state-of-the-art cloud computing specifically for privacy and security issues. The book will include all the prerequisite methodologies so that new researchers and practitioners will find it very useful. Chapter 1 deals with security-enhanced cloud techniques for serverless c omputing. The traditional cloud computing models are more complex in dealing with real-time data streams. The platform provides a place for all run-time applications to process. To improve the function of latency and efficiency of a system, new serverless com- puting is introduced. Serverless computing uses function-as-a-service (FaaS) models. FaaS liberates designers from the challenging work of working out or keeping up an unpredictable framework. Chapter 2 reveals the web of cloud computing with threats and vulnerabilities. The migration from client/server models to service-based models means that the techni- cal departments will have to revise their processes and procedures for implement- ing, developing, and distributing computer technology and applications. This chapter addresses an essential gap in our understanding of cloud computing by offering an overview of the cloud’s security risks, threats, and vulnerabilities. Additionally, this chapter includes many elements such as threat actors, risks, vulnerabilities, and ram- ifications from real-world attacks and breaches. Chapter 3 deals with the security and privacy provocation of data in cloud com- puting. Cloud computing is an on-demand resource sharing paradigm that carries sensitive information in cloud computing, covering a wide range of areas. These sensitive data on experiencing an attack can result in the crash of the entire system. This attracts the efforts of cybersecurity professionals to concentrate greatly on the security and privacy of sensitive data in cloud computing. Chapter 4 addresses the networking security incitements in cloud computing. According to the community of requests to accept the library of common configu- rable registered attributes, these attributes can be quickly set and loosened through light operations or collaboration with professional cooperative vendors, as quoted by the National Institute of Standards and Technology. The convenience and cost ade- quacy of this model are its two fundamental benefits. While there are still concerns about security and vendor lock-in, this model has many advantages. This chapter delves into some of the fundamentals of cloud computing, including its forms, ser- vices, challenges, and security concerns. Chapter 5 reports the major security concerns of virtualization in cloud comput- ing. Virtualization is a technical innovation that distinguishes functions from the underlying hardware. Attackers may breach VM infrastructures and get access to different VMs on the same system. A hypervisor is a software program that exists vii viii Preface between host virtual machines and hardware components. This chapter describes the cloud-based intrusion on the virtualized infrastructure. Chapter 6 deals with operational security agitations in cloud computing. Being vulnerable to attacks, cloud computing deteriorates the growth of business and the economy, as most companies rely on cloud computing for their business processes and financial transactions. The increase in advanced technology for launching dif- ferent types of attacks is a motivator in identifying technical solutions for improving the strength of the authentication process and safeguarding the cloud resources’ data assets. This chapter explains the different types of vulnerability of cloud computing and various methodologies using cryptographic algorithms proposed to break these vulnerabilities and strengthen the security policy of cloud computing. Chapter 7 describes the secure data storage and retrieval operations in cloud com- puting. This chapter proposes a new authentication system focusing on lightweight wireless devices and transferring information to the cloud processing without dis- closing the collected data to the provider. This technique optimizes data storage and retrieval. It optimizes the computation and communication overhead, which in turn reduces the cloud service charges. Chapter 8 takes a deep dive into popular security models and strategies of cloud computing. Cloud computing emerges as a horizon by serving critical applications. However, the unavailability of standard security standards and models makes cloud computing security more puzzling while transferring sensitive information across the cloud. This chapter aims to enlighten some of the novel security models and approaches in cloud computing. Chapter 9 deals with quantum computing and quantum cryptography in cloud computing. The power of quantum computers can break the computations that are incredibly complex because of the superposition bits used in these computations. When it comes to the development of quantum computers, it is essential to remember that the integrity of encrypted data is in jeopardy right now. This chapter addresses quantum cryptography, which uses quantum mechanics to encrypt and transport data in a way that cannot be hacked. Chapter 10 describes the extensive exploration of privacy and compliance consid- erations for hybrid cloud deployments. Public cloud and private cloud domains com- bine to form a platform known as hybrid cloud, which provides deployment methods to carry out various applications in different dimensions. The main issues faced by the hybrid cloud are minimal security controls and risk management. This hybrid storage service has opened up the scope for progress in organizational development. This chapter aims to highlight advanced privacy and security models for hybrid cloud models with state-of-the-art techniques as a functional discipline. Chapter 11 addresses the threat detection and incident response in cloud security. Cloud security is critical for cloud storage providers because they must safeguard sensitive information while adhering to several regulatory obligations. Even though the data stay the same, the regulatory obligations change depending on where the data are stored. Incident response (IR) is the process of minimizing the impact of a discovered attack or compromise in a system or network. Chapter 12 deals with the cyber artificial intelligence platform for cloud security. In the cloud, to ensure the security of the stored information, there are many models Preface ix and platforms to protect the various essential data and the information. Artificial intelligence-based approaches will provide improved cyber defense capabilities in the cybersecurity environment and help opponents refine cyber threats. Cyber arti- ficial intelligence is a significant change in our potential to safeguard sensitive data networks and digital environments. To authenticate several organizations’ stored data, the cyber artificial intelligence framework is used for cloud security. Chapter 13 proposes an enhanced hybrid and highly secure cryptosystem for mitigating security issues in cloud environments. In this chapter, a hybrid algorithm called enhanced hybrid privacy and secure (EHPS) algorithm is proposed, imple- mented, well evaluated, and compared with its peers. By understanding the posi- tive features of hybrid algorithms, the proposed algorithm integrates the features of Advanced Encryption Standard (AES), Data Encryption Standard (DES), cipher block chaining (CBC), and Triple DES algorithm. Moreover, the reduced encryption and decryption times of the proposed algorithm compared with hybrid cryptosystem make the proposed algorithm a positive choice when a cloud environment has to be implemented with reduced encryption/decryption times and enhanced safety.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.