A4 Refereed article in a conference publication

Obfuscation and Diversification for Securing Cloud Computing




AuthorsShohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen

EditorsVictor Chang, Muthu Ramachandran, Bob Walters, Gary Wills

Conference nameInternational Workshop

Publication year2017

Book title Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers

Series titleLecture Notes in Computer Science

Volume10131

First page 179

Last page202

Number of pages24

ISBN978-3-319-54379-6

eISBN978-3-319-54380-2

ISSN0302-9743

DOIhttps://doi.org/10.1007/978-3-319-54380-2_8

Self-archived copy’s web addresshttps://research.utu.fi/converis/portal/detail/Publication/17187037


Abstract

The evolution of cloud computing and advancement of its services has motivated the
organizations and enterprises to move towards the cloud, in order to provide
their services to their customers, with greater ease and higher efficiency.
Utilizing the cloud-based services, on one hand has brought along numerous
compelling benefits and, on the other hand, has raised concerns regarding the
security and privacy of the data on the cloud, which is still an ongoing
challenge. In this regard, there has been a large body of research on improving
the security and privacy in cloud computing. In this chapter, we first study
the status of security and privacy in cloud computing. Then among all the
existing security techniques, we narrow our focus on obfuscation and diversification
techniques. We present the state-of-the-art review in this field of study, how
these two techniques have been used in cloud computing to improve security.
Finally, we propose an approach that uses these two techniques with the aim of
improving the security in cloud computing environment and preserve the privacy
of its users.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 22:23