Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review
DOI:
https://doi.org/10.26438/ijcse/v7i9.219225Keywords:
Big data, cloud computing, security, cryptography, AESAbstract
Now a days Cloud computing services highly demanded in all over the world due to its large size spaces for data storing. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this paper we will survey of previous author’s research that how they analyses approaches for secure data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important techniques for the security purposes. Cryptography provides various symmetric and asymmetric algorithms to secure the data.
References
[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy Preserving Public Auditing for Regenerating-Code-Based Cloud Storage”, 2015.
[2] Henry C.H. Chen and Patrick P.C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation”, 2014.
[3] Henry C.H. Chen, Yuchong Hu, Patrick P.C. Lee, and Yang Tang, “NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds”, 2014.
[4] Kan Yang, Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 2013.
[5] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage”, 2012.
[6] Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, 2010.
[7] J.He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358, 2012.
[8] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Apr.Jun. 2012.
[9] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy preserving public auditing scheme for cloud storage”, 2013.
[10] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Sep. 2010.
[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.
[12] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011 .
[13] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
[14] Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applying network coding for the storage repair in a cloudof-clouds,” in Proc. USENIX FAST, 2012, p. 21.
[15] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.
[16] Mahesh U. Shankarwar and Ambika V. Pawar “Security and Privacy in Cloud Computing: A Survey”CSE Department, SIT, Symbiosis International University, Pune, India 30 January 2016.
[17]https://www.akamai.com/us/en/resources/data-security-in-cloud computing.jsp?gclid=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB&ef_id=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB:G:s&utm_source=google&utm_medium=cpc
[18] Kishore Kumar"Role of Cryptography & its Related Techniques in Cloud Computing Security" International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 5 Issue VIII, August 2017- Available at www.ijraset.com
[19]https://data-flair.training/blogs/cloud-computing-applications/
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
