An Innovative Security and Privacy Algorithm for AWS Cloud Computing

Authors

  • Aditya Gedam M. Tech Research Scholar, Computer Science & Engineering, Bhabha Engineering Research Institute Bhopal Bhabha University Bhopal, Madhya Pradesh, India Author
  • Jeetendra Singh Yadav Assistant Professor, Computer Science & Engineering, Bhabha Engineering Research Institute Bhopal Bhabha University Bhopal, Madhya Pradesh, India Author

Keywords:

AWS Cloud Computing, Security Algorithm, Privacy Protection, Data Encryption, Intrusion Detection System (IDS), Role-Based Access Control (RBAC)

Abstract

Cloud computing has revolutionized data storage and processing, with Amazon Web Services (AWS) emerging as a leading provider. However, ensuring robust security and privacy remains a critical challenge due to the increasing complexity and sophistication of cyber threats. This paper proposes an innovative security and privacy algorithm specifically designed for AWS cloud computing environments. The proposed algorithm integrates dynamic data encryption using AES and RSA, a real-time intrusion detection system powered by machine learning, and a hybrid Role-Based and Attribute-Based Access Control (RBAC & ABAC) model. Additionally, privacy-preserving data sharing using homomorphic encryption and a secure key management system leveraging AWS Key Management Service (KMS) are implemented to safeguard sensitive data. The algorithm emphasizes performance optimization to minimize latency and computational overhead. Comprehensive evaluation on real-world datasets will assess metrics such as encryption/decryption time, response time, scalability, and resistance to attacks. The results aim to deliver a scalable, efficient, and reliable security framework, addressing current vulnerabilities and enhancing trust in AWS cloud services.

Downloads

Download data is not yet available.

References

An, S., Leung, A., Hong, J. B., Eom, T., & Park, J. S. (2022). Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security. IEEE Access, 10, 75117–75134. https://doi.org/10.1109/ACCESS.2022.3190545

Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching Cybersecurity Using the Cloud. IEEE Transactions on Learning Technologies, 8(4), 383–392. https://doi.org/10.1109/TLT.2015.2424692

Majumdar, S., Xue, Y., Meng, Q., Misra, S., Wang, Z., & Liu, Y. (2022). ProSAS: Proactive Security Auditing System for Clouds. IEEE Transactions on Dependable and Secure Computing, 19(4), 2517–2534. https://doi.org/10.1109/TDSC.2021.3062204

Ma, F., Luo, X., & Litvinov, E. (2016). Cloud Computing for Power System Simulations at ISO New England—Experiences and Challenges. IEEE Transactions on Smart Grid, 7(6), 2596–2603. https://doi.org/10.1109/TSG.2016.2569493

Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. K. L. (2019). A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, 16(4), 565–579. https://doi.org/10.1109/TDSC.2017.2703626

Nadeem, F. (2020). A Unified Framework for User-Preferred Multi-Level Ranking of Cloud Computing Services Based on Usability and Quality of Service Evaluation. IEEE Access, 8, 180054–180066. https://doi.org/10.1109/ACCESS.2020.3027775

Luna, J. M., Abdallah, C. T., & Heileman, G. L. (2018). Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud. IEEE Transactions on Cloud Computing, 6(2), 428–439. https://doi.org/10.1109/TCC.2016.2543728

Li, J., Lin, D., Squicciarini, A. C., Li, J., & Jia, C. (2017). Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds. IEEE Transactions on Cloud Computing, 5(3), 499–509. https://doi.org/10.1109/TCC.2015.2485214

Malik, A. W., Khan, S., Khan, A. A., & Iqbal, S. (2017). CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++. IEEE Transactions on Services Computing, 10(4), 506–519. https://doi.org/10.1109/TSC.2015.2496164

Sarker, M. R., Wang, J., Li, Z., & Ren, K. (2018). Security and Cloud Outsourcing Framework for Economic Dispatch. IEEE Transactions on Smart Grid, 9(6), 5810–5819. https://doi.org/10.1109/TSG.2017.2697430

Downloads

Published

20-12-2024

Issue

Section

Research Articles

How to Cite

[1]
Aditya Gedam and Jeetendra Singh Yadav, “An Innovative Security and Privacy Algorithm for AWS Cloud Computing”, Int J Sci Res Sci Eng Technol, vol. 11, no. 6, pp. 335–343, Dec. 2024, Accessed: Jan. 03, 2025. [Online]. Available: https://ijsrset.com/index.php/home/article/view/IJSRSET241161121

Similar Articles

1-10 of 180

You may also start an advanced similarity search for this article.