An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud (original) (raw)

Security and Privacy of Data in Cloud Computing

International Journal of Recent Technology and Engineering (IJRTE), 2019

The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed tha...

CLOUD DATA SECURITY AND SECURE DATA SHARING METHODS

This is a common fact nowadays to use the external third party resources for data storage and sharing among multiple personnel of the same organization or different organizations. Such external resources are collectively known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency. Since from last 15 years, there are number of solutions and researches were conducted and applied. Data sharing both single user and multiuser in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some limitations and advantages. This paper addresses the current research problems of data security and privacy preserving in cloud servers. The study was presented over different methods of cloud data security and their comparative analysis first. At we discussed the research limitations of those methods.

PRIVACY PRESERVATION AND SECURITY TECHNIQUE FOR CLOUD COMPUTING : A REVIEW

In the world of technical life cloud computing has become integral part and also understanding the way of business is changing and is likely to continue changing into the future. Using cloud storage services means that you and others can access and share files across a range of devices and position. Files such as photos and videos can sometimes be unmanageable to email if they are too big or you have allot of data. You can upload your data to a cloud storage provider means you can speedily circulate your data with the help of cloud service and you can share your data files with anyone you choose. Since cloud computing shares distributed resources via network in the open environment thus it makes less secured. Data security has become a major issue in data sharing on cloud. The main motto behind our system is that it secures the data and generates the key for each transaction so every user can secure our shared data by the third party i.e. unethical hacker.

Privacy in Cloud computing : A Survey

Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User's data are stored and maintained out of user's premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected properly from unauthorized access. This paper presents a survey on different privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.

IJERT-A Novel Methodology for Secure Multi Owner Data Sharing for Dynamic Group in Cloud

International Journal of Engineering Research and Technology (IJERT), 2020

https://www.ijert.org/a-novel-methodology-for-secure-multi-owner-data-sharing-for-dynamic-group-in-cloud https://www.ijert.org/research/a-novel-methodology-for-secure-multi-owner-data-sharing-for-dynamic-group-in-cloud-IJERTV3IS050764.pdf Cloud computing provides an economical and efficient solution for group resource sharing among cloud users due to the character of low maintenance. A challenging issue is sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud due to the dynamic nature of the membership. This paper proposes a secure multi owner data sharing scheme, for dynamic groups in the cloud. RSA scheme provides secure and privacypreserving access control to users, guaranteeing any member in a group to anonymously utilize the cloud resource. AES-256 algorithm provides effective encryption for the data stored in the cloud. It also provides public revocation mechanism to support efficient revocation.

IJERT-Comparative Study of Privacy Preservation and Access Control of Cloud Data

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/comparative-study-of-privacy-preservation-and-access-control-of-cloud-data https://www.ijert.org/research/comparative-study-of-privacy-preservation-and-access-control-of-cloud-data-IJERTV3IS110113.pdf Security of data involved during sharing of data in a cloud computing environment is one of the biggest concerns in a cloud platform. Nobody should be trusted with important data, not even the Cloud Service Provider. Even though the Cloud Service Providers enforce the access control policies and follow protocols, they are ‘curious’. They want to find out as much information about the user’s data as possible. There have been several approaches which have been adopted in the past, to provide protection to the data but most of these techniques have certain disadvantages. Hence, a useful approach has been devised. This approach makes use of multiple layers of commutative encryption to protect data against Cloud Service Providers while an authorization mechanism enforced by the Cloud Service Provider is responsible for data protection against unauthorized users.

SECURE DATA SHARING WITH IN GROUPS IN THE CLOUD

Cloud computing refers to the delivery of computing resources over the Internet. Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. It provides high level of scalability, reliability and efficiency. In this paper we propose a secure data sharing scheme within the groups and how encryption techniques help the groups in sharing the data dynamically. Sharing of data between dynamic groups the storage overhead and encryption computation cost changes based on revoked users. So to avoid, this we are providing three level of security mechanism for individual members in a group with the help of encryption techniques to share data. In this technique data can be uploaded in to the server after the encryption of the content by the secret group key. When a new member is added to the group, this user can be granted access to the file wherein he can directly download the decrypted data file, without contacting the data owners but when they are downloading the file a secret key is generated and sent to their own mobile number, using that key user can download the data. Due to this mechanism data in the cloud is secured.

A STUDY ON SECURE CLOUD DATA SHARING SCHEMA USING DYNAMIC TECHNIQUES

Information sharing among clients of a cloud is greatly benefited due to cloud computing, low support and small cost of administration. Although security certification is required for sharing the out sourced information documents. Due to the continuous change in participation, sharing of information with protection safeguarding is difficult particularly for an untrusted cloud. Under the existing arrangements, the safe keeping of key transmission is totally done with the help of communication channel. In this project work weare proposing a safe and trustworthy information sharing plan for dynamic clients. We plan a path which is safe for the distribution of the keys without using a single communication channel, the group manager hands over the keys safely to the clients. The aim of our schema is to get control over fine-grained access, that means any of the users can use the cloud and the revoked users cannot use it after getting revoked. We can also safeguard the schema from collusion attack that means the users which are revoked cannot use the cloud once after getting revoked even if they indulge in conspiring with the untrusted cloud. In our approach we can accomplish a safe client repudiation plot by utilizing polynomial capacity. Our plan can fulfill fine adequacy, a fully protected revocation schema for the user can be attained. At last, this schema attain proficiency that means there is no need to update the old keys in the case when either a new user joins or an old user revokes.

An Overview of Privacy Scheme in Cloud Computing

Southern African Institute For Industrial Engineering 2014, 2014

(IaaS).An example is the accessing of services from remote databases through the use of Internet. This means users cannot physically or directly access data from the cloud server, without a client's knowledge. Therefore, there is no need for users to know the exact location of the server; but there is a need for securing the data and information especially in public cloud computing. The aim of this study was to investigate the security challenges or vulnerabilities of cloud computing and propose a conceptual solution. In this regard, a systematic literature search was conducted. Descriptive statistics was used to analyse the data. The researcher found that there are a lot of research issues within the area of security in cloud computing. Furthermore, through this overview study the researcher found that most policies of cloud computing providers allow them to modify or delete data which is not used or that occupy a chunk of the storage space without consulting the clients. This is another security vulnerability issue which creates a research platform.

Review Article Data Security and Privacy in Cloud Computing

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.