Review on Preserving Privacy Identity of Shared Data in Cloud (original) (raw)
Related papers
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges
IEEE Access, 2021
Private data is transmitted and stored online every second. Therefore, security and privacy assurances should be provided at all times. However, that is not always the case. Private information is often unwillingly collected, sold, or exposed, depriving data owners of their rightful privacy. In this article, various privacy threats, concepts, regulations, and personal data types are analyzed. An overview of Privacy Enhancing Technologies (PETs) and a survey of anonymization mechanisms, privacy tools, models, and metrics are presented together with an analysis of respective characteristics and capabilities. Moreover, this article analyses the applicability of the reviewed privacy mechanisms on today's Cloud Services and identifies the current research challenges to achieve higher privacy levels in the Cloud. INDEX TERMS Anonymization, cloud computing, privacy metrics, privacy enhancing technologies.
IJERT-A Novel Approach for Privacy Preservation of Intermediate Datasets in Cloud
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/a-novel-approach-for-privacy-preservation-of-intermediate-datasets-in-cloud https://www.ijert.org/research/a-novel-approach-for-privacy-preservation-of-intermediate-datasets-in-cloud-IJERTV3IS031837.pdf Massive computation power and storage capacity of cloud computing systems allow users to deploy computation and data intensive applications without infrastructure investment, where large application datasets can be stored in the cloud. Along the processing of data-intensive applications, a large number of intermediate datasets are generated which are often stored so as to save the cost of recomputing them. The impact of privacy requirements in the development of modern applications is increasing very quickly. For preserving privacy of datasets in cloud, encrypting all datasets are widely adopted in existing approaches. But the problem arises in preserving privacy of the large volume of intermediate datasets generated as this will neither be time efficient nor cost-effective. Hence, in this paper, we present a combination of anonymisation and encryption to enable securing of intermediate datasets. A heuristic algorithm is also used to identify which intermediate datasets are to be encrypted rather than encrypting all the intermediate datasets so as to enable cost effective security.
A Survey and Analysis for Accountability and Privacy of Shared Data in the Cloud
Ijca Proceedings on National Conference on Innovative Paradigms in Engineering Technology 2013, 2013
Cloud computing is an attractive utility-computing paradigm based on Service Level Agreements (SLAs) that is experiencing rapid uptake in the commercial sector. Cloud systems offer low cost public access to vast proprietary compute, storage, and network resources. These systems provide per-user and perapplication isolation and customization via a service interface that is typically implemented using high-level language technologies, well-defined APIs, and web services. Web interactions usually require the exchange of personal and confidential information for a variety of purposes, including enabling business transactions and the provisioning of services. A key issue affecting these interactions is the lack of trust and control on how data is going to be used and processed by the entities that receive this data. The data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. Information accountability has become a major concern for the data on the cloud. To provide information accountability for data on the cloud some major goals need to achieved: Fair : Data available to user hosted by CSP has to fair as given to them by cloud customer. Consistent : Data integrity and consistency must be preserved i.e. CSP should not discard rarely accessed data without being detected in a timely fashion Reliable : CSP should not attempt to hide data loss incidents and also leak the data to untrusted sources. Complete : CSP should not behave unfaithfully towards the cloud customer by deleting data which is rarely accessed or not fetching them good business. Different methods are introduced to provide integrity, accountability and security for data on clouds Some are applicable at platform-level, some are implementable on CSPside, while some are outsourced to TPA(Third Party Auditor) who audits on behalf of the user. These methods use either encryption policies or Java policies for authentication using nested JARs or sometimes even both together are used.
PRESERVING IDENTITY OF SHARED DATA STORED IN THE CLOUD USING PUBLIC AUDIT MECHANISM
Cloud Computing has been envis ioned as the next - generation architecture of IT Enterprise. The application software and databases are moved to the centralized large data centers, where managing the data and services may not be completely reliable. This work studies the problem of ensuri ng the integrity and security of data storage in Cloud Computing. We consider a scheme called threshold proxy re - encryption and secure erasure code, to verify the integrity and enhance server - side security of the dynamic data stored in the cloud. In the pr evious works, ensuring remote data reliability often lacks the support of either public audit ability or dynamic data transactions, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from cloud server. In our proposed work we use the multiple servers for storing data to servers. We avoid the additional storage for multi cloud system using split server concept as for security.
On Protecting Privacy in the Cloud
2015
Cloud computing has now emerged as popular computing paradigm for data storage and computation for enterprises and individuals. Its major characteristics include the pay-per-use pricing model, where users pay only for the resources they consume with no upfront cost for hardware/software infrastructures, and the capability of providing scalable and unlimited storage and computation resources to meet changing business needs of enterprises with minimal management overhead [1]. The cloud, however, presents a major limitation to enterprises and individuals who move to public clouds: they lose control over the systems that manage their data and applications, leading to increased security and privacy concerns [2,3,4].
IJERT-Comparative Study of Privacy Preservation and Access Control of Cloud Data
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/comparative-study-of-privacy-preservation-and-access-control-of-cloud-data https://www.ijert.org/research/comparative-study-of-privacy-preservation-and-access-control-of-cloud-data-IJERTV3IS110113.pdf Security of data involved during sharing of data in a cloud computing environment is one of the biggest concerns in a cloud platform. Nobody should be trusted with important data, not even the Cloud Service Provider. Even though the Cloud Service Providers enforce the access control policies and follow protocols, they are ‘curious’. They want to find out as much information about the user’s data as possible. There have been several approaches which have been adopted in the past, to provide protection to the data but most of these techniques have certain disadvantages. Hence, a useful approach has been devised. This approach makes use of multiple layers of commutative encryption to protect data against Cloud Service Providers while an authorization mechanism enforced by the Cloud Service Provider is responsible for data protection against unauthorized users.
Preserving Identify the User and Privacy of Data Usingcloud
2017
Storing and sharing of data in hybrid cloud is most commonly used but it poses many challenges of maintaining the secrecy of the data and anonymity of the user signing the data from the malicious users during public auditing. In literature many mechanisms have been introduced that works in achieving these challenges. ORUTA (One Ring to Rule Them All) is one such mechanism that works on privacy preserving public auditing. But ORUTA does not focus on dynamicity, traceability, freshness property and it mainly concentrates on static group. It also provides only partial auditing.The system proposed in this paper aims at fulfilling dynamicity, preserving identity of user and privacy of data. It also provides complete public auditability in hybrid cloud. The privacy of data and identity of the user signing the data is kept confidential and it is also safeguarded from adversaries internal and external to the group. This is achieved by using the Tri Degree Coalition (TDC) Architecture and Vi...
Pseudonym-Based Privacy Preserving Framework for Facilitating Cloud Data Security
International Journal of Recent Technology and Engineering, 2019
The advent of cloud computing has revolutionized the option of sharing cloud resources among the cloud users for minimizing the cost overhead. But, the cloud data security is considered as the predominant issue that need to be addressed through the implementation of privacy preserving approaches that sustains and prevents the cloud resources and users from being compromised by the malicious intruders. In this paper, a Pseudonym-based Privacy Preservation Framework (PBPRF) is proposed for understanding its potential towards the accuracy and privacy preservation of cloud data based on the concept of P-Gene. This proposed PBPRF incorporates the benefits of the P-Gene which is responsible in the cloud space for providing security for the stored and utilized private data in the cloud that are periodically exchanged with the clients of the cloud environment. This proposed PBPRF scheme ensures secure sharing of data by relying on a trustworthy data aggregation scheme which is fully depende...
A SYSTEM TO SUSTAIN IDENTITY SECRECY OF A USER ON SHARED DATA IN THE CLOUD
Data can be stored in cloud and also shared among multiple users. But the correctness of data present in the cloud may be in doubt as there exists human errors and also some hardware/software failures. Cloud data can be audited by both data owners and public verifiers. Many mechanisms exist through which data can be audited efficiently for checking reliability without retrieving the entire data from the cloud server. But, public auditing for checking the integrity of shared data will predictably reveal some private information about the identity to public verifiers. Therefore a unique mechanism to preserve identity privacy which supports public auditing for the shared data that is stored in cloud is proposed. Here ring signatures that are required to compute verification metadata for auditing the integrity of shared data are exploited. With this mechanism, the shared data integrity can be efficiently verified without retrieving entire file by not disclosing the identity of the signer on each block to the public verifier. Instead of verifying one by one , the mechanism will also perform multiple auditing tasks simultaneously.
SECURING PUBLISHED DATA IN CLOUD USING DATA INCOGNITO
TJPRC, 2013
Cloud computing is the current hotspot term in the Information Technology (IT) field due to its several profithitting factors like unlimited storage capacity, recovery, backups, low cost, quick improvement in business, and many more. A cloud infrastructure helps small scale industries to grow up and scale up their solutions on a large scale to earn a high income on investments. A Cloud Service Provider (CSP) provides all the services needed by a customer at their end on a pay-as-you go basis. In spite of all these valuable benefits, cloud lacks the security and privacy concerns regarding the published data in the cloud. There has been a lot of research to protect security and privacy of the published data. Generalization and bucketization aresome of the techniques for data security and privacy in cloud. But according to a research survey it has been found that both these methods have some limitations. In both of these methods, a certain amount of data is lost, mainly multi-dimensional data. In this paper we propose a scheme called Data Incognito which helps to improve the security and privacy of published data in cloud.