Designing Confidential Cloud Computing for Multi-Dimensional Threats and Safeguarding Data Security in a Robust Framework
Keywords:
Cyber Attack, Confidential Computing, Cloud Security, Cloud Service Provider, Encrypted DataAbstract
In the dynamic landscape of cloud computing, robust security is imperative to safeguard sensitive data from cyber threats. Protecting against unauthorized access and ensuring data integrity are fundamental fostering trust and reliability in cloud services. Cyber-attacks on clouds often start with tricks like phishing or spreading harmful software. Weak passwords, mistakes in settings, or outdated systems make it easy for hackers. Once they get in, they may steal data or harm shared resources. They try to gain more control and cause damage. Stopping these attacks needs good defences and always watching for anything suspicious. Confidential computing emerges as a paramount paradigm in cloud security, establishing secure enclaves that process sensitive data within isolated, encrypted spaces. This innovative approach significantly mitigates the risk of unauthorized access, providing heightened data confidentiality beyond conventional security measures. Notably, even cloud service providers are barred from accessing data within these secure enclaves, fortifying defences against insider threats. The architecture enables the secure processing of encrypted data, maintaining encryption during usage and offering an additional layer of protection. This proves invaluable in scenarios requiring the analysis or processing of sensitive information, effectively reducing the attack surface for potential threats.
Downloads
References
A. Pathak, I. Al-Anbagi and H. J. Hamilton, "An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23826-23840, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3189832.
S. Verma, S. Zeadally, S. Kaur and A. K. Sharma, "Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 13473-13481, Aug. 2022, doi: 10.1109/TITS.2021.3124730.
A. Ahmed, S. Abdullah, M. Bukhsh, I. Ahmad and Z. Mushtaq, "An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain," in IEEE Access, vol. 10, pp. 11404-11419, 2022, doi: 10.1109/ACCESS.2022.3146295.
M. Bin-Yahya, O. Alhussein and X. Shen, "Securing Software-Defined WSNs Communication via Trust Management," in IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22230-22245, 15 Nov.15, 2022, doi: 10.1109/JIOT.2021.3102578.
M. Nouman, U. Qasim, H. Nasir, A. Almasoud, M. Imran and N. Javaid, "Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs," in IEEE Access, vol. 11, pp. 6106-6121, 2023, doi: 10.1109/ACCESS.2023.3236983.
Z. Yu, Y. Liu, G. Xie, R. Li, S. Liu and L. T. Yang, "TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1185-1195, Feb. 2023, doi: 10.1109/TII.2022.3202539.
K. Sood, M. R. Nosouhi, D. D. N. Nguyen, F. Jiang, M. Chowdhury and R. Doss, "Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 965-979, 2023, doi: 10.1109/TIFS.2022.3233777.
M. Shafi, R. K. Jha and S. Jain, "LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G," in IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 658-671, March 2023, doi: 10.1109/TNSM.2022.3197921.
Z. Zhao, Q. Du and H. Song, "Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 7, pp. 8441-8451, July 2023, doi: 10.1109/TII.2022.3218722.
H. Whitworth, S. Al-Rubaye, A. Tsourdos and J. Jiggins, "5G Aviation Networks Using Novel AI Approach for DDoS
Detection," in IEEE Access, vol. 11, pp. 77518-77542, 2023, doi: 10.1109/ACCESS.2023.3296311.
D. D. N. Nguyen, K. Sood, Y. Xiang, L. Gao, L. Chi and S. Yu, "Toward IoT Node Authentication Mechanism in Next Generation Networks," in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13333-13341, 1 Aug.1, 2023, doi: 10.1109/JIOT.2023.3262822.
T. Ye, G. Li, I. Ahmad, C. Zhang, X. Lin and J. Li, "FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection," in IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 73-88, March 2022, doi: 10.1109/TNSM.2021.3131266.
Y. He, M. Kong, C. Du, D. Yao and M. Yu, "Communication Security Analysis of Intelligent Transportation System Using 5G Internet of Things From the Perspective of Big Data," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2199-2207, Feb. 2023, doi: 10.1109/TITS.2022.3141788.
M. Lefoane, I. Ghafir, S. Kabir and I. -U. Awan, "Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 921-929, Jan. 2023, doi: 10.1109/TII.2022.3192044.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.