An Investigational Study on Cloud Security Model and Data Privacy Schemes

  • Authors

    • Chaithra M H
    • Dr. Vagdevi S
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.24360
  • Cloud computing, Cloud security, Data privacy, Privacy preserving, Public auditing.
  • Abstract

    At present, cloud computing receiving more attention to the users as well as researchers. It is growing technology which showing more reliable development in the current processing world. It is increasingly popular by offering distinctive administrations like cloud facilitating, storage furthermore, servers and so on for various kinds of organizations as well as in scholastics. On the other hand, there are a few difficulties concerning distributed storage security and information protection. Security is as yet difficult in the distributed computing framework. Such difficulties incorporate loss of client's delicate information, spillage of information and revealing of clients mystery information. By considering these security and information protection issues inside the cloud foundation. This investigation for the most part audits the diverse security and protection difficulties, and arrangements. Additionally, this paper highlights the possible opportunities for storage security and data privacy in distributed computing environment

     

     
  • References

    1. [1] S. Basu et al., "Cloud computing security challenges & solutions-A survey," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 347-356.

      [2] Marinescu, Dan C. “Chapter-1 Cloud computing: theory and practice. Morgan Kaufmann," 2017. Science Direct. https://doi.org/10.1016/B978-0-12-812810-7.00001-7

      [3] W. C. N. Kaura and A. Lal, "Survey paper on cloud computing security," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2017, pp. 1-6.

      [4] Retrieved from ‘https://www.statista.com/statistics/321215/global-consumer-cloud-computing-users/.

      [5] Sun, Yunchuan, et al. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks 10.7 (2014): 190903.

      [6] A. M. El-Zoghby and M. A. Azer, "Cloud computing privacy issues, challenges and solutions," 2017 12th International Conference on Computer Engineering and Systems (ICCES), Cairo, 2017, pp. 154-160.

      [7] Chatterjee, Rishav, Sharmistha Roy, and U. G. Scholar. "Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud." International Journal of Engineering Science 11818 (2017).

      [8] Rathore, Bhawani Singh, Anju Singh, and Divakar Singh. "A survey of cryptographic and non-cryptographic techniques for privacy preservation." Int. J. Comput. Appl 130 (2015): 13.

      [9] Kang, Baoyuan, Jiaqiang Wang, and Dongyang Shao. "Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage." Mathematical Problems in Engineering 2017 (2017).

      [10] Somani, Gaurav, et al. "DDoS attacks in cloud computing: Issues, taxonomy, and future directions." Computer Communications 107 (2017): 30-48.

      [11] Q. Yan, F. R. Yu, Q. Gong and J. Li, "Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges," in IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 602-622, First quarter 2016.

      [12] Al-Anzi, Fawaz S., Sumit Kr Yadav, and Jyoti Soni. "Cloud computing: Security model comprising governance, risk management, and compliance." Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on. IEEE, 2014.

      [13] Zheng, Xufei, and Yonghui Fang. "An ais-based cloud security model." Intelligent Control and Information Processing (ICICIP), 2010 International Conference on. IEEE, 2010.

      [14] Ashraf, Salman, et al. "Transparency service model for data security in cloud computing." Computing, Mathematics and Engineering Technologies (iCoMET), 2018 International Conference on. IEEE, 2018.

      [15] Tesfamicael, Aklilu Daniel, et al. "Modeling for performance and security balanced trading communication systems in the cloud." (2017).

      [16] Lv, Junjie, and JulingRong. "Virtualization Security Risk Assessment for Enterprise Cloud Services Based on Stochastic Game Nets Model." IET Information Security (2017).

      [17] Ebrahim, Moshira A., Islam AM El-Maddah, and Hoda K. Mohamed. "Hybrid model for cloud data security using steganography." Computer Engineering and Systems (ICCES), 2017 12th International Conference on. IEEE, 2017.

      [18] Wei, Hang, et al. "A New BRB Model for Cloud Security-state Prediction based on the Large-scale Monitoring Data." IEEE Access (2017).

      [19] Zhou, Shengli, Lifa Wu, and CanghongJin. "A privacy-based SLA violation detection model for the security of cloud computing." China Communications 14.9 (2017): 155-165.

      [20] AIT, Bangalore. "Cloud Computing: Data Security Using RSA."

      [21] Pant, Vinay Kumar, Jyoti Prakash, and Amit Asthana. "Three-step data security model for cloud computing based on RSA and steganography." Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, 2015.

      [22] Shereek, Balkees Mohamed. "Improve Cloud Computing Security Using RSA Encryption with Fermat's Little Theorem." IOSR Journal of Engineering 4 (2014): 1.

      [23] Bansal, VineyPal, and Sandeep Singh. "A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs." Recent Advances in Engineering & Computational Sciences (RAECS), 2015 2nd International Conference on. IEEE, 2015.

      [24] Arora, Rachna, Anshu Parashar, and Cloud Computing Is Transforming. "Secure user data in cloud computing using encryption algorithms." International journal of engineering research and applications 3.4 (2013): 1922-1926.

      [25] Arora, Rachna, Anshu Parashar, and Cloud Computing Is Transforming. "Secure user data in cloud computing using encryption algorithms." International journal of engineering research and applications 3.4 (2013): 1922-1926.

      [26] Chennam, Krishna Keerthi, Lakshmi Muddana, and RajaniKanthAluvalu. "Performance analysis of various encryption algorithms for use in multistage encryption for securing data in the cloud." Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017 2nd IEEE International Conference on. IEEE, 2017.

      [27] Bakhtiari, Majid, Majid Nateghizad, and Anazida Zainal. "Secure Search Over Encrypted Data in Cloud Computing." Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on. IEEE, 2013.

      [28] Gampala, Veerraju, SrilakshmiInuganti, and Satish Muppidi. "Data security in cloud computing with elliptic curve cryptography." International Journal of Soft Computing and Engineering (IJSCE) 2.3 (2012): 138-141.

      [29] Puri, Neha A., Ajay R. Karare, and Rajesh C. Dharmik. "Deployment of the application on Cloud and enhanced data security in Cloud computing using ECC algorithm." Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on. IEEE, 2014.

      [30] Bansal, Akanksha, and Arun Agrawal. "Providing security, integrity, and authentication using ECC algorithm in cloud storage." Computer Communication and Informatics (ICCCI), 2017 International Conference on. IEEE, 2017.

      [31] Kanna, G. Prabu, and V. Vasudevan. "Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in the cloud." Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on. IEEE, 2016.

      [32] Nagalakshmi, N., and S. Rajalakshmi. "Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment." Computing, Communication and Information Systems (NCCCIS), 2015 IEEE Seventh National Conference on. IEEE, 2015.

      [33] Hiremath, Shivarajkumar, and Sanjeev Kunte. "A novel data auditing approach to achieve data privacy and data integrity in cloud computing." Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017 International Conference on. IEEE, 2017.

      [34] Schwab, David, et al. "A Secure Mobile Cloud Photo Storage System." Computer Communication and Networks (ICCCN), 2017 26th International Conference on. IEEE, 2017.

      [35] Patil, Nilesh R., and Rajesh Dharmik. "Secured cloud architecture for cloud service provider." Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), World Conference on. IEEE, 2016.

      [36] Timothy, DivyaPrathana, and Ajit Kumar Santra. "A hybrid cryptography algorithm for cloud computing security." Microelectronic Devices, Circuits, and Systems (ICMDCS), 2017 International conference on. IEEE, 2017.

      [37] Lei, Sun, Dai Zishan, and Guo Jindi. "Research on key management infrastructure in cloud computing environment." Grid and Cooperative Computing (GCC), 2010 9th International Conference on. IEEE, 2010.

      [38] Sriprasadh, K., and O. Pandithurai. "A novel method to secure cloud computing through multicast key management." Information Communication and Embedded Systems (ICICES), 2013 International Conference on. IEEE, 2013.

      [39] Wang, Yan, Zhi Li, and Yuxia Sun. "Cloud computing key management mechanism for cloud storage." (2015): 4-4.

      [40] Cheng, Yingye, Hao Li, and Nan Zhang. "Character-based online key management in cloud computing environment." Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016 IEEE. IEEE, 2016.

      [41] Gellman R (2009). WPF REPORT: Privacy in the clouds: Risks to privacy and confidentiality from cloud computing.

      [42] Xiao Z, and Xiao Y. Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol PP(99), 1–17.

      [43] Wang J, Zhao Y et al. (2009). Providing Privacy preserving in cloud computing, International Conference on Test and Measurement, vol 2, 213–216.

      [44] Greveler U, Justus b et al. (2011). A Privacy Preserving System for Cloud Computing, 11th IEEE International conference on Computer and Information Technology, 648–653.

      [45] Zhou M, Mu Y et al. (2011). Privacy-Preserved Access Control for Cloud Computing, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83–90.

      [46] Chadwick D W, and Fatema K (2012). Privacy-preserving authorization system for the cloud, Journal of Computer and System Sciences, vol 78(5), 1359–1373.

      [47] Sayi T J V R K M K, Krishna R K N S et al. (2012). Data Outsourcing in Cloud Environments: A Privacy Preserving Approach, 9th International Conference on Information Technology- New Generations, 361–366.

      [48] Rahaman S M, and Farhatullah M (2012). PccP: A Model for Preserving Cloud Computing Privacy, International Conference on Data Science & Engineering (ICDSE), 166–170.

      [49] Waqar A, Raza A et al. (2013). A framework for reservation of cloud users' data privacy using the dynamic reconstruction of metadata, Journal of Network and Computer Applications, vol 36(1), 235–248.

      [50] Wang C, Wang Q et al. (2010). Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proceedings IEEE INFOCOM’10.

      [51] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,†Proc. 11th

      USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, 2007.

      [52] Huang, R., Yu, S., Zhuang, W., & Gui, X. 2010. Design of privacy-preserving cloud storage framework. In Grid and CooperativeComputing (GCC), 2010 9th International Conference on (pp. 128-132). IEEE

      [53] Huang, Z., Li, Q., Zheng, D., Chen, K., & Li, X. 2011, December. YI Cloud: Improving user privacy with secret key recovery in cloud storage. In Service Oriented System engineering (SOSE), 2011 IEEE 6th International Symposium on (pp. 268-272). IEEE.

      [54] Fan, C. I., & Huang, S. Y. 2012. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage.Future Generation Computer Systems.

      [55] Ruj, S., Stojmenovic, M., & Nayak, A. 2012, May. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In Cluster, Cloud and Grid Computing (CCGrid),12th IEEE/ACM International Symposium on(pp. 556-563). IEEE.

      [56] Wang C, Chow S S M et al. (2013). Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, vol 62(2), 362–375.

      [57] Munir, K., Palaniappan, S.: Security threats/attacks present in cloud environment. IJCSNS 12(12) (2012)

      [58] Mahmood, Z.: Data Location and Security Issues in Cloud Computing. In: IEEE International Conference on Emerging intelligent Data and Web Technologies (2011)

      [59] Attas, D., Batrafi, O.: Efficient integrity checking technique fro securing client data in cloud computing. IJECS-IJENS 11(5) (2011)

      [60] Arockiam, L., Parthasarathy, et al.: Privacy in Cloud Computing: Survey. CS&IT (2012)

      [61] Sharma, P., Sood, S.K., Kaur, S.: Security Issues in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 36–45. Springer, Heidelberg (2011)

      [62] Top Threats to the Cloud Computing V1.0, Cloud Security Alliance, http://www.cloudsecurityalliance.org/topthreats/2010

      [63] Babu, J., Kishore, K., Kumar, K.E.: Migration from Single to Multi-Cloud Computing. International Journal of Engg. Research and Tech. 2(4) (April 2013)

      [64] Munir, K., Palaniappan, S.: Secure Cloud Architecture. ACIJ 4(1) (2013)

      [65] Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. In: IEEE International Conference on Computer Science and Electronics Engineering (2012)

      [66] Miranda, M., Pearson, S.: A Client-based Privacy Manager for cloud Computing. In: Proceeding of the Fourth International ICST Conference on Comm. and Middleware, COMSWARE 2009 (2009).

      [67] Gentry, C.: Fully Homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)

      [68] Li, X., He, J., Zhang, T.: A Service-Oriented Identity Authentication Privacy Protection Method in Cloud computing. International Journal of Grid and Distributed Computing 6(1) (February 2013)

      [69] Mishra, R., Dash, S., Mishra, D.: Privacy-preserving Repository for securing data across the Cloud. IEEE (2011)

      [70] Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog Computing: Mitigating Insider Data Theft Attacks in Cloud. In: IEEE CS Security and Privacy Workshop (2012)

      [71] Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing using Elliptic Curve Cryptography. International Journal of Soft Computing and Engg 2(3) (July 2012)

      [72] Bohli, J.M., Gruschka, N., Jensen, M., Iacono, L.L., Marnau, N.: Security and Privacy- Enhancing Multi-cloud Architectures. IEEE Transactions on Dependable and Secure Computing 10(4) (July/August 2013)

  • Downloads

  • How to Cite

    M H, C., & Vagdevi S, D. (2018). An Investigational Study on Cloud Security Model and Data Privacy Schemes. International Journal of Engineering & Technology, 7(4.39), 485-491. https://doi.org/10.14419/ijet.v7i4.39.24360

    Received date: 2018-12-19

    Accepted date: 2018-12-19

    Published date: 2018-12-13