Next Article in Journal
A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
Next Article in Special Issue
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing
Previous Article in Journal
A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics
Previous Article in Special Issue
Feature-Based Image Watermarking Algorithm Using SVD and APBT for Copyright Protection
Article Menu

Export Article

Open AccessArticle
Future Internet 2017, 9(3), 23; doi:10.3390/fi9030023

Security Enhancement for Data Migration in the Cloud

School of Communication Engineering, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Academic Editor: Luis Javier Garcia Villalba
Received: 30 May 2017 / Revised: 14 June 2017 / Accepted: 16 June 2017 / Published: 22 June 2017
(This article belongs to the Special Issue Information Systems Security)
View Full-Text   |   Download PDF [367 KB, uploaded 22 June 2017]   |  

Abstract

In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software) and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds. View Full-Text
Keywords: Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS) Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS)
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Ngnie Sighom, J.R.; Zhang, P.; You, L. Security Enhancement for Data Migration in the Cloud. Future Internet 2017, 9, 23.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top