A4 Refereed article in a conference publication
Obfuscation and Diversification for Securing Cloud Computing
Authors: Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen
Editors: Victor Chang, Muthu Ramachandran, Bob Walters, Gary Wills
Conference name: International Workshop
Publication year: 2017
Book title : Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papers
Series title: Lecture Notes in Computer Science
Volume: 10131
First page : 179
Last page: 202
Number of pages: 24
ISBN: 978-3-319-54379-6
eISBN: 978-3-319-54380-2
ISSN: 0302-9743
DOI: https://doi.org/10.1007/978-3-319-54380-2_8
Self-archived copy’s web address: https://research.utu.fi/converis/portal/detail/Publication/17187037
The evolution of cloud computing and advancement of its services has motivated the
organizations and enterprises to move towards the cloud, in order to provide
their services to their customers, with greater ease and higher efficiency.
Utilizing the cloud-based services, on one hand has brought along numerous
compelling benefits and, on the other hand, has raised concerns regarding the
security and privacy of the data on the cloud, which is still an ongoing
challenge. In this regard, there has been a large body of research on improving
the security and privacy in cloud computing. In this chapter, we first study
the status of security and privacy in cloud computing. Then among all the
existing security techniques, we narrow our focus on obfuscation and diversification
techniques. We present the state-of-the-art review in this field of study, how
these two techniques have been used in cloud computing to improve security.
Finally, we propose an approach that uses these two techniques with the aim of
improving the security in cloud computing environment and preserve the privacy
of its users.
Downloadable publication This is an electronic reprint of the original article. |