Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing
Keywords:Use about five key words or phrases in alphabetical order, Separated by Semicolon.
Cloud Computing (CC) is reforming many biological communities by furnishing associations with registering assets including simple organization, network, design, Romanization, and adaptability. This change in perspective raises an expansive scope of security and protection issues that must be thought about. Multi-tenure, loss of control, and trust are entering challenges in cloud processing conditions. This paper surveys the current advancements and a wide show of both earlier and frontier extends on cloud security and protection. We classify the current look into as per the cloud reference engineering coordination, asset control, physical asset, and cloud benefit administration layers, in spite of inspecting the current improvements in security safeguarding touchy information approaches in CC, such as, security risk demonstrating and protection upgrading conventions and arrangements.
 S. Pearson, â€œPrivacy, security and trust in CC ,â€ in Privacy and Security for CC (S. Pearson and G. Yee, eds.), Computer Communications and Networks, pp. 3â€“42, Springer London, 2013.
 E. U. Directive, â€œ95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data,â€ Official Journal of the EC, vol. 23, 1995.
 U. States., â€œHealth insurance portability and accountability act of 1996 [micro form] : conference report (to accompany h.r. 3103).â€ http://nla.gov.au/nla.catvn4117366, 1996.
 â€œHypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environment.â€ Retrieved June 2015.
 M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEX Inc.,
 F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, NIST CC Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292). USA: CreateSpace Independent Publishing Platform, 2012.
 R. Dua, A. Raja, and D. Kakadia, â€œVirtualization vs containerization to support paas,â€ in Cloud Engineering (IC2E), 2014 IEEE International Conference on, pp. 610â€“614, March 2014.
 D. Bernstein, "Containers and Cloud: From LXC to Docker to Kubernetes," IEEE CC , vol. 1, no. 3, pp. 81-84, 2014.
 R. Pike, D. Presotto, K. Thompson, H. Trickey, and P. Winterbottom, â€œThe use of name spaces in plan 9,â€ SIGOPS Oper. Syst. Rev., vol. 27, pp. 72â€“76, Apr. 1993.
 NIST Special Publication 500â€“291 version 2, NIST CCStandards Roadmap, July 2013, Available at http://www.nist.gov/itl/cloud/publications.cfm.
 B. Russell, â€œRealizing Linux Containers (LXC).â€ http://www.slideshare.net/BodenRussell/linuxcontainers next-gen- virtualization-for-cloud-atl-summit-ar4-3-copy. Retrieved October 2015.
 U. S. F. Law, â€œRight to financial https://epic.org/privacy/rfpa/, 1978. privacy act of 1978.â€
 United Nations, â€œThe Universal Declaration of Human Rights.â€http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2015.
 A. Westin, Privacy and Freedom. New Jork Atheneum, 1967.
 D. Bigo, G. Boulet, C. Bowden, S. Carrera, J. Jeandesboz, and A. Scherrer, â€œFighting cyber crime and protecting privacy in the cloud.â€ European Parliament, Policy Department C: Citizensâ€™ Rights and Constitutional Affairs, October 2012.
 S. Stalla-Bourdillon, â€œLiability exemptions wanted! internet intermediariesâ€™ liability under uk law,â€ Journal of International Commercial Law and Technology, vol. 7, no. 4, 2012.
 N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, â€œA framework for authentication and authorization credentials in CC ,â€ in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509â€“516, July 2013.
 R. Banyal, P. Jain, and V. Jain, â€œMulti-factor authentication framework for CC ,â€ in Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on, pp. 105â€“110, Sept 2013.
 R. Lomotey and R. Deters, â€œSaas authentication middleware for mobile consumers of iaas cloud,â€ in Services (SERVICES), 2013 IEEE Ninth World Congress on, pp. 448â€“455, June 2013.
 H. Kim and S. Timm, â€œX.509 authentication and authorization in fermi cloud,â€ in Utility and CC(UCC), 2014 IEEE/ACM 7th International Conference on, pp. 732â€“737, Dec 2014.
 B. Tang, R. Sandhu, and Q. Li, â€œMulti-tenancy authorization models for collaborative cloud services,â€ in Collaboration Technologies and Systems (CTS), 2013 International Conference on, pp. 132â€“138, May 2013.
 L. Zhou, V. Varadharajan, and M. Hitchens, â€œIntegrating trust with cryptographic role-based access control for secure cloud data storage,â€ in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 560â€“569, July 2013.
 J. Sendor, Y. Lehmann, G. Serme, and A. Santana de Oliveira, â€œPlatform level support for authorization in cloud services with oauth 2,â€ in Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E â€™14, (Washington, DC, USA), pp. 458â€“465, IEEE Computer Society, 2014. infrastructure of the egi federated cloud,â€ in High Performance Computing Simulation (HPCS), 2015
 C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arzen, F. Hernandez- Rodriguez, and E. Elmroth, â€œImproving cloud service re silience using brownout-aware loadbalancing,â€ in Reliable Cloud Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31â€“40, Oct 2014.
 E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, â€œA synchronization mechanism for cloud accounting systems,â€ in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111â€“120, Sept 2014.
 M. Anand, â€œCloud monitor: Monitoring applications in cloud,â€ in CCin Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1â€“4, Oct 2012.
 A. Brinkmann, C. Fiehe, A. Litvina, I. LÃ¼ck, L. Nagel, K. Narayanan, F. Ostermair, and W. Thronicke, â€œScalable monitoring system for clouds,â€ in Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and CC , UCC â€™13, (Washington, DC, USA), pp. 351â€“356, IEEE Computer Society, 2013.
 J. Nikolai and Y. Wang, â€œHypervisor-based cloud intrusion detection system,â€ in Computing,Networking and Communications (ICNC), 2014 International Conference on, pp. 989â€“993, Feb 2014.
 C. Basescu, A. Carpen-Amarie, C. Leordeanu, A. Costan, and G. Antoniu, â€œManaging data access onclouds: A generic framework for enforcing security policies,â€ in Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pp. 459â€“466, March 2011.
 H. Takabi and J. Joshi, â€œPolicy management as a service: An approach to manage policy heterogeneity in CCenvironment,â€ in System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 5500â€“5508, Jan 2012.
 K. W. Hamlen, L. Kagal, and M. Kantarcioglu, â€œPolicy enforcement framework for cloud data management.,â€ IEEE Data Eng. Bull., vol. 35, no. 4, pp. 39â€“45, 2012.
 S. Fischer-Hubner, J. Angulo, and T. Pulls, â€œHow can cloud users be supported in deciding on, tracking and controlling how their data are usedâ€ in Privacy and Identity Management for Emerging Services and Technologies (M. Hansen, J.-H. Hoepman, R. Leenes, and D. Whitehouse, eds.), vol. 421 of IFIP Advances in Information and Communication Technology, pp. 77â€“92, Springer Berlin Heidelberg, 2014.
 E. Ayday, J. Raisaro, U. Hengartner, A. Molyneaux, and J.-P. Hubaux, â€œPrivacy-preserving processing of raw genomic data,â€ in Data Privacy Management and Autonomous Spontaneous Security (J. Garcia-Alfaro, G. Lioudakis, N. Cuppens-Boulahia, S. Foley, and W. M. Fitzgerald, eds.), vol. 8247 of Lecture Notes in Computer Science, pp. 133147, Springer Berlin Heidelberg, 2014.
 Y. Huang and I. Goldberg, â€œOutsourced private information retrieval,â€ in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES â€™13, (New York, NY, USA), pp. 119â€“130, ACM, 2013.
 K. Lauter, A. Lopez-Alt, and M. Naehrig, â€œPrivate computation on encrypted genomic data,â€ Tech. Rep. MSR-TR-2014-93, June 2014.