Pseudonym-Based Privacy Preserving Framework for Facilitating Cloud Data Security (original) (raw)
Related papers
Review on Preserving Privacy Identity of Shared Data in Cloud
Citation/Export MLA Deepak. A, Mary D'souza, “Review On Preserving Privacy Identity Of Shared Data In Cloud”, March 15 Volume 3 Issue 3 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 954 - 957, DOI: 10.17762/ijritcc2321-8169.150312 APA Deepak. A, Mary D'souza, March 15 Volume 3 Issue 3, “Review On Preserving Privacy Identity Of Shared Data In Cloud”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 954 - 957, DOI: 10.17762/ijritcc2321-8169.150312
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges
IEEE Access, 2021
Private data is transmitted and stored online every second. Therefore, security and privacy assurances should be provided at all times. However, that is not always the case. Private information is often unwillingly collected, sold, or exposed, depriving data owners of their rightful privacy. In this article, various privacy threats, concepts, regulations, and personal data types are analyzed. An overview of Privacy Enhancing Technologies (PETs) and a survey of anonymization mechanisms, privacy tools, models, and metrics are presented together with an analysis of respective characteristics and capabilities. Moreover, this article analyses the applicability of the reviewed privacy mechanisms on today's Cloud Services and identifies the current research challenges to achieve higher privacy levels in the Cloud. INDEX TERMS Anonymization, cloud computing, privacy metrics, privacy enhancing technologies.
A SYSTEM TO SUSTAIN IDENTITY SECRECY OF A USER ON SHARED DATA IN THE CLOUD
Data can be stored in cloud and also shared among multiple users. But the correctness of data present in the cloud may be in doubt as there exists human errors and also some hardware/software failures. Cloud data can be audited by both data owners and public verifiers. Many mechanisms exist through which data can be audited efficiently for checking reliability without retrieving the entire data from the cloud server. But, public auditing for checking the integrity of shared data will predictably reveal some private information about the identity to public verifiers. Therefore a unique mechanism to preserve identity privacy which supports public auditing for the shared data that is stored in cloud is proposed. Here ring signatures that are required to compute verification metadata for auditing the integrity of shared data are exploited. With this mechanism, the shared data integrity can be efficiently verified without retrieving entire file by not disclosing the identity of the signer on each block to the public verifier. Instead of verifying one by one , the mechanism will also perform multiple auditing tasks simultaneously.
Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization
2012
Cloud computing is a model that enables Convenient and Ondemand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Security and Privacy concerns are significant obstacle that is preventing the extensive adoption of the public cloud in the Industry. Multi-tenancy where multiple tenants share cloud infrastructure poses an additional concern about the deliberate or accidental exposure of data. Data Anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Data can also be anonymized by using techniques such as, Hashing, Hiding, and Shifting etc. The proposed system uses novel model of security i.e k-anonymity to improve data anonymization. It uses dynamic anonymization technique, key distribution mechanism to preserve confidentiality of cloud data.This paper giv...
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Cloud computing is a model that enables Convenient and On-demand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Privacy and Security are significant obstacle that is preventing the extensive adoption of the public cloud in the Industry. Researchers have developed privacy models such as k-anonymity, l-diversity, t-closeness. However, even though these privacy models are applied, an attacker may still be able to access some confidential data if same sensitive labels are used by a group of nodes. Publishing data about individuals without revealing sensitive information about them is an important problem. Data Anonymization is a method that makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data that it prevents identification of key information from an unauthorized person. We survey the existing methods of anonymization to protect sensitive information stored in cloud. Data can also be anonymized by using techniques such as, Hashing, Hiding, Permutation, Shifting, Truncation, Prefix-preserving, Enumeration, etc. We have implemented these methods also to see an anonymization effect and implemented a new method for anonymization.
A privacy preserving repository for securing data across the cloud
2011
Popularity of cloud computing is increasing day by day in distributed computing environment. There is a growing trend of using cloud environments for storage and data processing needs. Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. This paper primarily highlights some major security issues existing in current cloud computing environments. The primary issue that has to be dealt with when talking about data security in a cloud is protection of the data. The idea is to construct a privacy preserving repository where data sharing services can update and control the access and limit the usage of their shared data, instead of submitting data to central authorities, and, hence, the repository will promote data sharing and privacy of data. This paper aims at simultaneously achieving data confidentiality while still keeping the harmonizing relations intact in the cloud. Our proposed scheme enables the data owner to delegate most of computation intensive tasks to cloud servers without disclosing data contents or user access privilege information.
Protecting Data Privacy in Cloud
International Journal of Engineering and Advanced Technology, 2020
Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community's public key is changed to avoid abuse.
Privacy as a service: privacy-aware data storage and processing in cloud computing architectures
Dependable, Autonomic and …, 2009
In this paper we present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof facilities provides a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access. PasS central design goal is to maximize users' control in managing the various aspects related to the privacy of sensitive data. This is achieved by implementing user-configurable software protection and data privacy mechanisms. Moreover, PasS provides a privacy feedback process which informs users of the different privacy operations applied on their data and makes them aware of any potential risks that may jeopardize the confidentiality of their sensitive information. To the best of our knowledge, PasS is the first practical cloud computing privacy solution that utilizes previous research on cryptographic coprocessors to solve the problem of securely processing sensitive data in cloud computing infrastructures.
Security and Privacy of Data in Cloud Computing
International Journal of Recent Technology and Engineering (IJRTE), 2019
The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed tha...
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
A means of reliably concealing ownership of cloud data without impeding computation over the data is presented and evaluated. This facilitates information privacy enforcement in cloud environments by withholding data ownership information from cloud nodes that compute using the data. As a result, nodes that have access to private data in unencrypted form do not know who owns it, what role their computations play in the larger computational task, or to whom their computation results are ultimately delivered. To provide this data ownership privacy, the cloud's distributed computing resources are leveraged to implement an anonymizing circuit based on Tor, through which users submit private data and jobs. A tunable parameter k controls a trade-off between the degree of anonymity and the computational overhead imposed by the system. Anonymous authentication based on publickey cryptography safely links jobs and data to customers for billing purposes without revealing these associations to untrusted computation nodes. Simulation results demonstrate the potency of the system in presence of attackers.