Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Issues in Data Security and Privacy in Cloud Computing

Dr. S. Senthil, S. K. Sharathgouda

Abstract


Cloud registering has increased impressive research intrigue, immense scope of administrations. The real issues in distributed computing are its protection and security. The term security has numerous sides, for example, accessibility classification, and honesty. An immaculate security arrangement must guarantee all the security parameters adequately. This paper centers around the security of information alone. This paper point is to audit different security and protection related issues and the conceivable arrangements in writing. The difficulties related with the security and protection related issues are additionally talked about.

Keywords


Cloud Figuring, Classification, Security, Protection, Uprightness, Accessibility.

Full Text:

PDF

References


A. Aviˇzienis, J. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004.

J. Krumm, “A survey of computational location privacy,” Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391–399, 2009.

Deepak Puthal, B. P. S. Sahoo, Sambit Mishra, and Satyabrata Swain, "Cloud Computing Features, Issues and Challenges: A Big Picture", International Conference on Computational Intelligence & Networks, pp. 116-123, 2015.

R. L. Rivest, L. Adleman, and M. L.Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 11, pp. 169–180, 1978.

C. Gentry, A fully homomorphic encryption scheme [Ph.D. thesis], Stanford University, 2009.

A. Kaur and M. Bhardwaj, “Hybrid encryption for cloud database security,” Journal of Engineering Science Technology, vol. 2, pp. 737–741, 2012.

R. Arora, A. Parashar, and C. C. I. Transforming, “Secure user data in cloud computing using encryption algorithms,” International Journal of Engineering Research and Applications, vol. 3, no. 4, pp. 1922–1926, 2013.

D. Manivannan and R. Sujarani, “Light weight and secure database encryption using tsfs algorithm,” in Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT '10), pp. 1–7, IEEE, 2010.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.

C. P. Ram and G. Sreenivaasan, “Security as a service (sass): securing user data by coprocessor and distributing the data,” in Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, (TISC '10), pp. 152–155, IEEE, December 2010.

E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Proceedings of the 8th International Conference on Informatics and Systems (INFOS'12), pp. CC-12–CC-17, IEEE, 2012.

C. Delettre, K. Boudaoud, and M. Riveill, “Cloud computing, security and data concealment,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC ’11), pp. 424–431, Kerkyra, Greece, July 2011.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” In ACM CCS, pages 598-609, 2007.

A. Juels and B. S. Kaliski, “PORs: Proofs of retrievability for large files,” In ACM CCS, pages 584-597, 2007.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” SecureComm, 2008.

C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” Proc. 16th ACM conference on Computer and communications security, 2009, pp. 213- 222.

Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, and Fatos Xhafa, "OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices", IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 3, NO. 2, pp. 195-205, 2015.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. ESORICS’09, Saint Malo, France, Sep. 2009.

Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren,and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, pp. 362-375, 2013.

Ling Li, Lin Xu, Jing Li, Changchun Zhang, "Study on the Third-party Audit in Cloud Storage Service", International Conference on Cloud and Service Computing, 2011.

Boyang Wang, Baochun Li and Hui Li, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud", IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, pp. 92-106, 2015.

Boyang Wang, Baochun Li and Hui Li, "Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud", IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, pp.43-56, 2014.

Pritee Parwekar, Mayuri Saxena, Prakash Kumar, Sakshi Saxena, "Public Auditing: Cloud Data Storage", 5th International Conference- Confluence The Next Generation Information Technology Summit (Confluence), pp. 169-173, 2014.

Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation", IEEE Transactions on Computers, 2015.

Jiawei Yuan and Shucheng Yu, "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 8, pp. 1717 - 1726, 2015.

Amazon, Amazon Web Services. Web services licensing agreement, Accessed in May-2011 (2006).

S. L. Garfinkel, An evaluation of amazon’s grid computing services: EC2, S3, and SQS, http://simson.net/clips/academic/2007.Harvard.S3.pdf, 2007, pp. 1-15.

C. Cachin, I. Keidar and A. Shraer, Trusting the cloud, ACM SIGACT News, 40 (2009), pp. 81-86.

J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, “Cyber Security and Privacy Issues in Smart Grids,” IEEE Commun. Surveys Tuts., DOI: 10.1109/SURV.2011.122111.00145, in press.

Y. Xiao, X. Shen, B. Sun, and L. Cai, “Security and Privacy in RFID and Applications in Telemedicine,” IEEE Commun. Mag., Vol. 44. No. 4, Apr. 2006, pp. 64-72.

H. Chen, Y. Xiao, X. Hong, F. Hu, J. Xie, “A Survey of Anonymity in Wireless Communication Systems,” (Wiley Journal) Security and Communication Networks, Vol. 2 No. 5, Sept./Oct., 2009, pp. 427-444.

W. Itani, A. Kayssi, and A. Chehab, “Privacy as a Service: Privacy Aware Data Storage and Processing in Cloud Computing Architectures,” IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.

A. Haeberlen. “A Case for the Accountable Cloud,” 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware (LADIS ’09), Big Sky, MT, October 2009

C. Wang and Y. Zhou, “A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable.” Hotcloud 2010.

W. Wei, J. Du, T. Yu, and X. Gu, “Secure MR: A Service Integrity Assurance Framework for MapReduce,” Proc. 2009 Annual Computer Security Applications Conference, 2009,.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.