Survey on Preserving Data Privacy in Cloud

Authors

  • Paul B PG Scholar, Mets School of engineering, Calicut university, Kerala, India
  • M. Azath

Keywords:

Cloud computing, Data sharing, Privacy Preserving

Abstract

Cloud computing is the future of information technology. It demonstrates all the big trends in the design and use of computer architectures. With cloud computing, it is necessary for data to be not only stored in the cloud but also shared across multiple users, when the data are sharing privacy breach of the data can occur. In cloud computing preserving data privacy is an important task because the data itself contains sensitive information. A basic solution for preserving data privacy is to encrypt the data, and then upload the encrypted data into the cloud. As next give a data access notification to the data owner, providing complete permission of control to the user over the data. Designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task. Oruta is the first privacy-preserving mechanism for shared data stored in the cloud. By using homomorphic authenticable ring structures, it gives privacy preserving public auditing for secure clouds to storage system. This survey analyzes various techniques for preserving shared data privacy in the cloud.

References

http://en.wikipedia.org/wiki/Cloud_computing

Rong C, Nguyen S T et al. (2013). “Beyond lightning: A sur¬vey on security challenges in cloud computing”, Computers & Electrical Engineering, vol 39(1), 47–54.

DananThilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo “Secure Data Sharing in the Cloud”

Wang J, Zhao Y et al. (2009).” Providing Privacy preserving in cloud computing”, International Conference on Test and Measurement, vol 2, 213–216.

Greveler U, Justus b et al. (2011). “A Privacy Preserving System for Cloud Computing”, 11th IEEE International Conference on Computer and Information Technology, 648–653.

Zhou M, Mu Y et al. (2011).” Privacy-Preserved Access Control for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83–90.

Chadwick D W, and Fatema K (2012). “A privacy preserving authorization system for the cloud”, Journal of Computer and System Sciences, vol 78(5), 1359–1373.

Sayi T J V R K M K, Krishna R K N S et al. (2012) “Data Outsourcing in Cloud Environments: A Privacy Preserving Approach”, 9th International Conference on Information Technology- New Generations, 361–366

Rahaman S M, and Farhatullah M (2012). “PccP: A Model for Preserving Cloud Computing Privacy”, International Conference on Data Science & Engineering (ICDSE), 166–170.

Wang C, Wang Q et al. (2010). “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing”, Proceedings IEEE INFOCOM’

Wang C, Chow S S M et al. (2013). “Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, vol 62(2), 362–375.

Wang B, Li B et al. (2012).”Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE Fifth International Conference on Cloud Computing, 295-302

Jithin, S., and P. Sujatha. "An Analysis on Privacy Preserving in Cloud Computing."

Onankunju, Bibin K. "Access Control in Cloud Computing."

T. Jothi Neela, and N. Saravanan, Privacy Preserving Approaches in Cloud: A survey, IJST, vol.6.

Downloads

Published

2014-12-31

How to Cite

[1]
B. Paul and M. Azath, “Survey on Preserving Data Privacy in Cloud”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 57–61, Dec. 2014.