Chaos Theory and Systems in Cloud Content Security

Chaos Theory and Systems in Cloud Content Security

Kanksha Zaveri (Dwarkadas J. Sanghvi College of Engineering, India), Niti Shah (Dwarkadas J. Sanghvi College of Engineering, India) and Ramchandra S. Mangrulkar (Dwarkadas J. Sanghvi College of Engineering, India)
DOI: 10.4018/978-1-5225-8407-0.ch017
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Cloud computing involves storing data using a third party that ensures that confidential data cannot be accessed even by the cloud itself. Thus, security is one major issue in cloud computing. Recent advancements in exploiting chaotic systems' sensitivity to initial conditions, and their ability to extract strings of random numbers for confusion and diffusion have helped enhance security. They can provide resistance from statistical attack and protection against reconstruction dynamics. However, the concept of chaos for security is still in its emerging stages. This chapter presents how chaos theory can be used for random number generation to further secure data in the cloud. The authors have discussed and compared some popular methods for authentication and encryption of data, images, and videos. The overview of chaos engineering discusses the discipline of experimenting on multi-server systems to ensure its ability to tackle glitches.
Chapter Preview


Chaos theory is the study of complex nonlinear dynamic systems. These systems follow deterministic laws themselves, yet the behavior of these systems appears to be random and unpredictable. Chaotic systems are known for their sensitivity to initial conditions. The creation of minuscule changes in the initial state of a copy of the same system will exhibit large differences in both of them. Systems becoming so disparate due to small amounts of change is why it only makes sense to predict these systems within a certain time period. Beyond that time period, the predictions become highly inaccurate. Dependence on initial conditions is illustrated in the “butterfly effect” where a tornado in Texas could be traced back to something as minor as a butterfly flapping its wings in Africa.

Chaos is found in all sorts of places from planetary motion, to chemical systems, population growth, electrical circuits, and encryption schemes. Its ability to generate seemingly random numbers and extreme sensitivity towards the initial state is what makes it exciting in security.

Cloud Content Security refers to the protection of the data and the processing in the cloud from external attacks. Cloud is a third party application used to provide storage, servers and the processing at the network, and ease the user of the load of handling those locally.

The objective of the chapter is to understand the ways in which chaotic systems can be used in cloud content security. This chapter is organized as follows: a background of chaotic systems is given in the first section. The next section introduces cloud content security. This is followed by a detailed study highlighting different methods of using chaos for security in the cloud. Lastly, there is a case study on Chaos Engineering, followed by the Conclusion and Future Scope.

Complete Chapter List

Search this Book: