Next Article in Journal
A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
Next Article in Special Issue
A Security Framework for the Internet of Things in the Future Internet Architecture
Previous Article in Journal
A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics
Previous Article in Special Issue
Private and Secure Distribution of Targeted Advertisements to Mobile Phones
Article Menu
Issue 3 (September) cover image

Export Article

Open AccessArticle
Future Internet 2017, 9(3), 23;

Security Enhancement for Data Migration in the Cloud

School of Communication Engineering, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018, China
Author to whom correspondence should be addressed.
Academic Editor: Luis Javier Garcia Villalba
Received: 30 May 2017 / Revised: 14 June 2017 / Accepted: 16 June 2017 / Published: 22 June 2017
(This article belongs to the Collection Information Systems Security)
Full-Text   |   PDF [367 KB, uploaded 22 June 2017]   |  


In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software) and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds. View Full-Text
Keywords: Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS) Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS)

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Ngnie Sighom, J.R.; Zhang, P.; You, L. Security Enhancement for Data Migration in the Cloud. Future Internet 2017, 9, 23.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top