An Innovative Security and Privacy Algorithm for AWS Cloud Computing
Keywords:
AWS Cloud Computing, Security Algorithm, Privacy Protection, Data Encryption, Intrusion Detection System (IDS), Role-Based Access Control (RBAC)Abstract
Cloud computing has revolutionized data storage and processing, with Amazon Web Services (AWS) emerging as a leading provider. However, ensuring robust security and privacy remains a critical challenge due to the increasing complexity and sophistication of cyber threats. This paper proposes an innovative security and privacy algorithm specifically designed for AWS cloud computing environments. The proposed algorithm integrates dynamic data encryption using AES and RSA, a real-time intrusion detection system powered by machine learning, and a hybrid Role-Based and Attribute-Based Access Control (RBAC & ABAC) model. Additionally, privacy-preserving data sharing using homomorphic encryption and a secure key management system leveraging AWS Key Management Service (KMS) are implemented to safeguard sensitive data. The algorithm emphasizes performance optimization to minimize latency and computational overhead. Comprehensive evaluation on real-world datasets will assess metrics such as encryption/decryption time, response time, scalability, and resistance to attacks. The results aim to deliver a scalable, efficient, and reliable security framework, addressing current vulnerabilities and enhancing trust in AWS cloud services.
Downloads
References
An, S., Leung, A., Hong, J. B., Eom, T., & Park, J. S. (2022). Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security. IEEE Access, 10, 75117–75134. https://doi.org/10.1109/ACCESS.2022.3190545
Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching Cybersecurity Using the Cloud. IEEE Transactions on Learning Technologies, 8(4), 383–392. https://doi.org/10.1109/TLT.2015.2424692
Majumdar, S., Xue, Y., Meng, Q., Misra, S., Wang, Z., & Liu, Y. (2022). ProSAS: Proactive Security Auditing System for Clouds. IEEE Transactions on Dependable and Secure Computing, 19(4), 2517–2534. https://doi.org/10.1109/TDSC.2021.3062204
Ma, F., Luo, X., & Litvinov, E. (2016). Cloud Computing for Power System Simulations at ISO New England—Experiences and Challenges. IEEE Transactions on Smart Grid, 7(6), 2596–2603. https://doi.org/10.1109/TSG.2016.2569493
Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. K. L. (2019). A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Transactions on Dependable and Secure Computing, 16(4), 565–579. https://doi.org/10.1109/TDSC.2017.2703626
Nadeem, F. (2020). A Unified Framework for User-Preferred Multi-Level Ranking of Cloud Computing Services Based on Usability and Quality of Service Evaluation. IEEE Access, 8, 180054–180066. https://doi.org/10.1109/ACCESS.2020.3027775
Luna, J. M., Abdallah, C. T., & Heileman, G. L. (2018). Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud. IEEE Transactions on Cloud Computing, 6(2), 428–439. https://doi.org/10.1109/TCC.2016.2543728
Li, J., Lin, D., Squicciarini, A. C., Li, J., & Jia, C. (2017). Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds. IEEE Transactions on Cloud Computing, 5(3), 499–509. https://doi.org/10.1109/TCC.2015.2485214
Malik, A. W., Khan, S., Khan, A. A., & Iqbal, S. (2017). CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++. IEEE Transactions on Services Computing, 10(4), 506–519. https://doi.org/10.1109/TSC.2015.2496164
Sarker, M. R., Wang, J., Li, Z., & Ren, K. (2018). Security and Cloud Outsourcing Framework for Economic Dispatch. IEEE Transactions on Smart Grid, 9(6), 5810–5819. https://doi.org/10.1109/TSG.2017.2697430
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science, Engineering and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.