Next Article in Journal
A Novel Iterative Thresholding Algorithm Based on Plug-and-Play Priors for Compressive Sampling
Next Article in Special Issue
A Security Framework for the Internet of Things in the Future Internet Architecture
Previous Article in Journal
A Method for Identifying the Mood States of Social Network Users Based on Cyber Psychometrics
Previous Article in Special Issue
Private and Secure Distribution of Targeted Advertisements to Mobile Phones
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Enhancement for Data Migration in the Cloud

School of Communication Engineering, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Future Internet 2017, 9(3), 23; https://doi.org/10.3390/fi9030023
Submission received: 30 May 2017 / Revised: 14 June 2017 / Accepted: 16 June 2017 / Published: 22 June 2017
(This article belongs to the Collection Information Systems Security)

Abstract

In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software) and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.
Keywords: Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS) Advanced Encryption Standard (AES-256); Information Dispersal Algorithms (IDAs); Secure Hash Algorithm (SHA-512); Cauchy Reed Solomon (C-RS)

Share and Cite

MDPI and ACS Style

Ngnie Sighom, J.R.; Zhang, P.; You, L. Security Enhancement for Data Migration in the Cloud. Future Internet 2017, 9, 23. https://doi.org/10.3390/fi9030023

AMA Style

Ngnie Sighom JR, Zhang P, You L. Security Enhancement for Data Migration in the Cloud. Future Internet. 2017; 9(3):23. https://doi.org/10.3390/fi9030023

Chicago/Turabian Style

Ngnie Sighom, Jean Raphael, Pin Zhang, and Lin You. 2017. "Security Enhancement for Data Migration in the Cloud" Future Internet 9, no. 3: 23. https://doi.org/10.3390/fi9030023

APA Style

Ngnie Sighom, J. R., Zhang, P., & You, L. (2017). Security Enhancement for Data Migration in the Cloud. Future Internet, 9(3), 23. https://doi.org/10.3390/fi9030023

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop