A4 Article in conference proceedings
Obfuscation and Diversification for Securing Cloud Computing

List of Authors: Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen
Publication year: 2017
Book title *: Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers
Title of series: Lecture Notes in Computer Science
Volume number: 10131
Number of pages: 24
ISBN: 978-3-319-54379-6
eISBN: 978-3-319-54380-2
ISSN: 0302-9743


The evolution of cloud computing and advancement of its services has motivated the
organizations and enterprises to move towards the cloud, in order to provide
their services to their customers, with greater ease and higher efficiency.
Utilizing the cloud-based services, on one hand has brought along numerous
compelling benefits and, on the other hand, has raised concerns regarding the
security and privacy of the data on the cloud, which is still an ongoing
challenge. In this regard, there has been a large body of research on improving
the security and privacy in cloud computing. In this chapter, we first study
the status of security and privacy in cloud computing. Then among all the
existing security techniques, we narrow our focus on obfuscation and diversification
techniques. We present the state-of-the-art review in this field of study, how
these two techniques have been used in cloud computing to improve security.
Finally, we propose an approach that uses these two techniques with the aim of
improving the security in cloud computing environment and preserve the privacy
of its users.

Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.

Last updated on 2019-20-07 at 16:58