Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review

Authors

  • Kumari A Dept. of Computer science and Engineering, RKDF Institute of Science and Technology (RKDFIST), Bhopal, India
  • Namdeo V Dept. of Computer science and Engineering, RKDF Institute of Science and Technology (RKDFIST), Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v7i9.219225

Keywords:

Big data, cloud computing, security, cryptography, AES

Abstract

Now a days Cloud computing services highly demanded in all over the world due to its large size spaces for data storing. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this paper we will survey of previous author’s research that how they analyses approaches for secure data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important techniques for the security purposes. Cryptography provides various symmetric and asymmetric algorithms to secure the data.

References

[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy Preserving Public Auditing for Regenerating-Code-Based Cloud Storage”, 2015.

[2] Henry C.H. Chen and Patrick P.C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation”, 2014.

[3] Henry C.H. Chen, Yuchong Hu, Patrick P.C. Lee, and Yang Tang, “NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds”, 2014.

[4] Kan Yang, Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 2013.

[5] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage”, 2012.

[6] Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, 2010.

[7] J.He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358, 2012.

[8] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Apr.Jun. 2012.

[9] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy preserving public auditing scheme for cloud storage”, 2013.

[10] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Sep. 2010.

[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.

[12] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011 .

[13] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.

[14] Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applying network coding for the storage repair in a cloudof-clouds,” in Proc. USENIX FAST, 2012, p. 21.

[15] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.

[16] Mahesh U. Shankarwar and Ambika V. Pawar “Security and Privacy in Cloud Computing: A Survey”CSE Department, SIT, Symbiosis International University, Pune, India 30 January 2016.

[17]https://www.akamai.com/us/en/resources/data-security-in-cloud computing.jsp?gclid=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB&ef_id=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB:G:s&utm_source=google&utm_medium=cpc

[18] Kishore Kumar"Role of Cryptography & its Related Techniques in Cloud Computing Security" International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 5 Issue VIII, August 2017- Available at www.ijraset.com

[19]https://data-flair.training/blogs/cloud-computing-applications/

Downloads

Published

2019-09-30
CITATION
DOI: 10.26438/ijcse/v7i9.219225
Published: 2019-09-30

How to Cite

[1]
A. Kumari and V. Namdeo, “Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review”, Int. J. Comp. Sci. Eng., vol. 7, no. 9, pp. 219–225, Sep. 2019.

Issue

Section

Review Article