IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Obfuscation Techniques In Cloud Computing: A Systematic Survey

[Full Text]

 

AUTHOR(S)

P Nagaraju, Dr N Nagamalleswara Rao,

 

KEYWORDS

Cloud computing, Obfuscation, Security threats, Network, Remote Server

 

ABSTRACT

Cloud computing refers to the practice of storing, managing and processing data with the help of a network or remote servers hosted on the internet rather than a local server or a personal computer. Cloud computing offers flexible resources and economies of scale by delivering computing services such as storage, networking, databases, software, servers, analytics and more over the internet which can be said as ‘the cloud’. The main reason behind the shifting of traditional way business to cloud computing is with respect to cost, speed, productivity, performance and security. Moreover the security risks should be ensured while sharing the data and resources over the cloud, since there exists security threats such as malicious insiders, hijacking, human error, Distributed Denial of Service attacks and more. Hence, the security and privacy of the cloud should be made more significant by proposing improved techniques on cloud computing. One of the solution is obfuscation which is the most promising technique to prevent and protect the computer systems and networks from above said security threats. In general, obfuscation is the process of converting something difficult to understand using a specifically designed tool called obfuscator which converts the source code automatically in to a program that is much harder to read and understand but works the same way as the source program. This survey aims to enhance the security and privacy of cloud computing with a detailed learning of the obfuscation techniques which rescues the data from malicious attacks in an uncontrolled environment. A systemic review is done on the existing obfuscation techniques and a report is generated that results in the exploration of state of the art in techniques and the algorithms for software obfuscation.

 

REFERENCES

[1] Chunming Rong, Son T. Nguyen, Martin Gilje Jaatun, Beyond lightning: A survey on security challenges in cloud computing, Computers and Electrical Engineering 39 (2013), pp 47–54.
[2] R. Velumadhava Rao, K. Selvamani, Data Security Challenges and Its Solutions in Cloud Computing, Procedia Computer Science 48 ( 2015 ), pp 204 – 209.
[3] Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing, International Conference on Computer Science and Electronics Engineering 2012, pp 647-651.
[4] Vashpalsinh Jadeja, Kirit Modi, Cloud computing - concepts, architecture and challenges, Intenational Conference on Computing, Electronics and Electrical Technologies 2012, pp 877-880.
[5] Nalini Subramanian, Andrews Jeyaraj, Recent security challenges in cloud computing, Computers and Electrical Engineering 71 (2018), pp 28–42.
[6] S. Subashini, V.Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications 2010, pp 1-11.
[7] Ngo Yang Chong, Cloud Computing Challenges in a General Perspective, Journal of computing and management studies 2019, pp 1-15.
[8] Shanthini KK, Kaviya K, Sujithra M, A survey on cloud computing: data security challenges and their defensive mechanisms, International Journal of Recent Scientific Research 2018, pp. 26497-26500.
[9] Mohammed Faez Al-Jaberi and Anazida Zainal, Data Integrity and Privacy Model in Cloud Computing, International Symposium on Biometrics and Security Technologies 2014, pp 280-284.
[10] Ping Li1 , Jin Li1, Zhengan Huang1, Chong-Zhi Gao1 , Wen-Bin Chen1, Kai Chen, Privacy-preserving outsourced classification in cloud computing, Cluster Comput (2018) 21, pp 277–286.
[11] Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Cloud Computing Systems 2014, pp 1-9.
[12] Bhawani Singh Rathore, Anju Singh, Divakar Singh, A Survey of Cryptographic and Non-cryptographic Techniques for Privacy Preservation, International Journal of Computer Applications 2015, pp 7-10.
[13] Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, Villi Leppanen, Security and Privacy in Cloud Computing Obfuscation and Diversification: a Survey, IEEE Conference on Cloud computing 2015, pp 529-535.
[14] Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja Khurram Shahzad, Multilevel classification of security concerns in cloud computing, Applied Computing and Informatics (2017) 13, pp 57–65.
[15] Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Chung-Peng Huang, Identity-Based Encryption with Cloud Revocation Authority and Its Applications, IEEE transactions on cloud computing 2018, pp 1041-1053.
[16] K.Sharmila, S. Borgia Anne Catherine, Sreeja V.S, A comprehensive Study of Data Masking Techniques on cloud, International Journal of Pure and Applied Mathematics 2018, pp 3719-3727.
[17] Sebastian Lins, Stephan Schneider, Ali Sunyaev, Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing, IEEE TRANSACTIONS ON CLOUD COMPUTING 2018, pp 890-903.
[18] Jianghong Wei, Wenfen Liu, Xuexian Hu, Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption, IEEE TRANSACTIONS ON CLOUD COMPUTING 2018, pp 1136-1148.
[19] Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo , Anonymous and Traceable Group Data Sharing in Cloud Computing, Ieee Transactions On Information Forensics And Security 2018, pp 912-925.
[20] Aiping Li1, Shuang Tan1, Yan Jia1, A method for achieving provable data integrity
in cloud computing, J Supercomput (2019) 75, pp 92–108.
[21] Manoj Tyagi, Manish Manoria and Bharat Mishra, A Framework for Data Storage Security with Efficient Computing in Cloud, Springer 2019, pp 109-116.
[22] Popov, S. K. Debray, and G. R. Andrews, “Binary obfuscation using signals.” in USENIX Security 2007, pp 1-8.
[23] C. Linn and S. Debray, Obfuscation of executable code to improve resistance to static disassembly, in Proceedings of the 10th ACM Conference on Computer and Communications Security 2003, pp 290–299.
[24] Top Threats Working Group, The notorious nine: cloud computing top threats in 2013, Cloud Security Alliance 2013.pp 1-10.
[25] D.I.George Amalarethinam, B.FathimaMary, Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography, World Congress on Computing and Communication Technologies 2017, pp 181-184.
[26] D.I.George Amalarethinam, B.FathimaMary., Data Security Enhancement in Public Cloud Storage using Data Obfuscation, Perspective in Science, Elsevier 2016, pp 1-10.
[27] Khaled M. Khan, Mahboob Shaheen, Data Obfuscation for Privacy and Confidentiality in Cloud Computing, IEEE computer society 2015, pp 195-196.
[28] Chugui Xu, Ju Ren, Deyu Zhang, and Yaoxue Zhang, Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics, IEEE Communications Magazine 2018, pp 20-25.
[29] J. Hamm, Enhancing Utility and Privacy with Noisy Minima Filters, Proc. IEEE Int’l. Conf. Acoustics, Speech and Signal Processing 2017, pp 6389–93.
[30] Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey, IEEE computer Society 2010, pp 297-300.
[31] A. Balakrishnan and C. Schulze, Code Obfuscation Literature Survey, http://pages.cs.wisc.edu/~arinib/writeup.pdf, 2005.
[32] E. Konstantinou, Metamorphic Virus: Analysis and Detection, Technical Report of University of London 2008, http://www.rhul.ac.uk/mathematics/techreports 2008,
[33] W. Wong and M. Stamp, Hunting for Metamorphic Engines, Journal in Computer Virology 2006, pp. 211-229.
[34] M. Christodorescu and S. Jha, Static Analysis of Executables to Detect Malicious Patterns, Proceedings of the 12th conference on USENIX Security Symposium 2003, pp. 169-186.
[35] Dean C. Mumme, Brooke Wallace, Robert McGraw, Cloud Security via Virtualized Out-of-band Execution and Obfuscation, IEEE Computer Society 2017, pp 286-293.
[36] Krunal Suthar, Jayesh Patel, EncryScation: A Novel Framework for Cloud IaaS, DaaS security using Encryption and Obfuscation Techniques, IEEE Computer Society 2015, pp 1-5.
[37] Muhammad Hataba, Ahmed El-Mahdy, Cloud Protection by Obfuscation: Techniques and Metrics, IEEE Computer Society 2012, pp 369-372.
[38] Michael Mateas, Nick Montfort, A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics, In Proceedings of the 6th Digital Arts and Culture Conference, IT University of Copenhagen 2005, pp. 144-153.
[39] G. Zhang, Y. Yang, and J. Chen, A privacy-leakage-tolerance based noise enhancing strategy for privacy protection in cloud computing, in Trust, Security and Privacy in Computing and Communications (TrustCom)2013, pp. 1–8.
[40] G. Zhang, X. Liu, and Y. Yang, Time-series pattern based effective noise generation for privacy protection on cloud, IEEE Transactions 2015, pp. 1456–1469.
[41] L. Arockiam and S. Monikandan, Efficient cloud storage confidentiality to ensure data security, Computer Communication and Informatics (ICCCI) 2014, pp. 1–5.
[42] M. Mowbray, S. Pearson, and Y. Shen, Enhancing privacy in cloud computing via policy-based obfuscation, The Journal of Supercomputing2012, pp. 267–291.
[43] X. He, S. Luo, D. Tao, C. Xu, J. Yang, and M. Hasan, Eds. Springer International Publishing 2015, pp. 430–441.
[44] M. Kuzu, M. S. Islam, and M. Kantarcioglu, Efficient privacy-aware search over encrypted databases, Proceedings of the 4th ACM Conference on Data and Application Security and Privacy 2014, pp. 249–256.
[45] B. Bertholon, S. Varrette, and P. Bouvry, Comparison of multi-objective optimization algorithms for the javascript obfuscator, Parallel Distributed Processing Symposium Workshops 2014 IEEE International, pp. 489–496.
[46] R. Omar, A. El-Mahdy, and E. Rohou, Arbitrary control-flow embedding into multiple threads for obfuscation: A preliminary complexity and performance analysis, Proceedings of the 2Nd International Workshop on Security in Cloud Computing 2014, pp. 51–58.
[47] B. Agir, T. Papaioannou, R. Narendula, K. Aberer, and J.-P. Hubaux, User-side adaptive protection of location privacy in participatory sensing, GeoInformatica 2014, pp. 165–191.
[48] J. Kay, P. Lukowicz, H. Tokuda, P. Olivier, and A. Krger, Eds. Springer Berlin Heidelberg, 2012, vol. 7319, pp. 388–405.
[49] A. Celesti, M. Fazio, M. Villari, and A. Puliafito, Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems, Journal of Network and Computer Applications, 2014.
[50] M. Villari, A. Celesti, F. Tusa, and A. Puliafito, Data reliability in multi-provider cloud storage service with rrns, Advances in Service- Oriented and Cloud Computing, ser. Communications in Computer and Information Science 2013, vol. 393, pp. 83–93.
[51] R. Padilha and F. Pedone, Confidentiality in the cloud, Security Privacy, IEEE 2015, pp. 57–60.
[52] G. Gao-xiang, Y. Zheng, and F. Xiao, “The homomorphic encryption scheme of security obfuscation,” in Advances in Image and Graphics Technologies, ser. Communications in Computer and Information Science 2013, vol. 363, pp. 127–135.
[53] M. Palanques, R. DiPietro, C. del Ojo, M. Malet, M. Marino, and T. Felguera, Secure cloud browser: Model and architecture to support secure web navigation, Reliable Distributed Systems (SRDS) 2012, pp. 402–403.