Designing Confidential Cloud Computing for Multi-Dimensional Threats and Safeguarding Data Security in a Robust Framework

Authors

  • Vasavi Bande Associate Professor, Department of Information Technology, MVSR Engineering College, Hyderabad, Telangana 501510
  • B. Deevena Raju Senior Assistant Professor , Department of Data Science and Artificial Intelligence, Faculty of Science and Technology,, ICFAI Foundation for Higher Education, Hyderabad-501203
  • Karu Prasada Rao Assistant Professor, Department of Computer Science & Engineering, GITAM School of Technology, GITAM, Visakhapatnam, 510419
  • Suneet Joshi Assistant Professor, Department of Computer Science & Engineering, School of Computing Science and Engineering, VIT Bhopal University Gram: Kothari Kalan, Sehore
  • Sonia H. Bajaj Research Coordinator, Department of Computer Science and Engineering, G H Raisoni University, Nagpur
  • V. Sarala Associate professor, Department of Computer Science and Engineering, Saveetha school of Engineering, Saveetha Institute of Medical and Technical sciences (SIMATS)

Keywords:

Cyber Attack, Confidential Computing, Cloud Security, Cloud Service Provider, Encrypted Data

Abstract

In the dynamic landscape of cloud computing, robust security is imperative to safeguard sensitive data from cyber threats. Protecting against unauthorized access and ensuring data integrity are fundamental fostering trust and reliability in cloud services. Cyber-attacks on clouds often start with tricks like phishing or spreading harmful software. Weak passwords, mistakes in settings, or outdated systems make it easy for hackers. Once they get in, they may steal data or harm shared resources. They try to gain more control and cause damage. Stopping these attacks needs good defences and always watching for anything suspicious. Confidential computing emerges as a paramount paradigm in cloud security, establishing secure enclaves that process sensitive data within isolated, encrypted spaces. This innovative approach significantly mitigates the risk of unauthorized access, providing heightened data confidentiality beyond conventional security measures. Notably, even cloud service providers are barred from accessing data within these secure enclaves, fortifying defences against insider threats. The architecture enables the secure processing of encrypted data, maintaining encryption during usage and offering an additional layer of protection. This proves invaluable in scenarios requiring the analysis or processing of sensitive information, effectively reducing the attack surface for potential threats.

Downloads

Download data is not yet available.

References

A. Pathak, I. Al-Anbagi and H. J. Hamilton, "An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23826-23840, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3189832.

S. Verma, S. Zeadally, S. Kaur and A. K. Sharma, "Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems," in IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 8, pp. 13473-13481, Aug. 2022, doi: 10.1109/TITS.2021.3124730.

A. Ahmed, S. Abdullah, M. Bukhsh, I. Ahmad and Z. Mushtaq, "An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain," in IEEE Access, vol. 10, pp. 11404-11419, 2022, doi: 10.1109/ACCESS.2022.3146295.

M. Bin-Yahya, O. Alhussein and X. Shen, "Securing Software-Defined WSNs Communication via Trust Management," in IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22230-22245, 15 Nov.15, 2022, doi: 10.1109/JIOT.2021.3102578.

M. Nouman, U. Qasim, H. Nasir, A. Almasoud, M. Imran and N. Javaid, "Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs," in IEEE Access, vol. 11, pp. 6106-6121, 2023, doi: 10.1109/ACCESS.2023.3236983.

Z. Yu, Y. Liu, G. Xie, R. Li, S. Liu and L. T. Yang, "TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1185-1195, Feb. 2023, doi: 10.1109/TII.2022.3202539.

K. Sood, M. R. Nosouhi, D. D. N. Nguyen, F. Jiang, M. Chowdhury and R. Doss, "Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 965-979, 2023, doi: 10.1109/TIFS.2022.3233777.

M. Shafi, R. K. Jha and S. Jain, "LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G," in IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 658-671, March 2023, doi: 10.1109/TNSM.2022.3197921.

Z. Zhao, Q. Du and H. Song, "Traffic Load Learning Towards Early Detection of Intrusion in Industrial mMTC Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 7, pp. 8441-8451, July 2023, doi: 10.1109/TII.2022.3218722.

H. Whitworth, S. Al-Rubaye, A. Tsourdos and J. Jiggins, "5G Aviation Networks Using Novel AI Approach for DDoS

Detection," in IEEE Access, vol. 11, pp. 77518-77542, 2023, doi: 10.1109/ACCESS.2023.3296311.

D. D. N. Nguyen, K. Sood, Y. Xiang, L. Gao, L. Chi and S. Yu, "Toward IoT Node Authentication Mechanism in Next Generation Networks," in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13333-13341, 1 Aug.1, 2023, doi: 10.1109/JIOT.2023.3262822.

T. Ye, G. Li, I. Ahmad, C. Zhang, X. Lin and J. Li, "FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection," in IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 73-88, March 2022, doi: 10.1109/TNSM.2021.3131266.

Y. He, M. Kong, C. Du, D. Yao and M. Yu, "Communication Security Analysis of Intelligent Transportation System Using 5G Internet of Things From the Perspective of Big Data," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2199-2207, Feb. 2023, doi: 10.1109/TITS.2022.3141788.

M. Lefoane, I. Ghafir, S. Kabir and I. -U. Awan, "Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 921-929, Jan. 2023, doi: 10.1109/TII.2022.3192044.

Downloads

Published

11.01.2024

How to Cite

Bande, V. ., Raju, B. D. ., Rao, K. P. ., Joshi, S. ., Bajaj, S. H. ., & Sarala, V. . (2024). Designing Confidential Cloud Computing for Multi-Dimensional Threats and Safeguarding Data Security in a Robust Framework. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 246–255. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4446

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.