Open Access Open Access  Restricted Access Subscription Access

Privacy Preserving Approaches in Cloud: a Survey


Affiliations
1 School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, India
 

Cloud Computing is continuously evolving and showing consistent growth in the field of computing. But, the security issues and threats associated with it still stay as a cumbersome. The focal point of this paper is Privacy preserving in cloud computing. This paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, anonymising data, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud data. The surveyed approaches are showcased and compared with one another, stating their pros and cons. Finally, the results are centralized and the issues to be concentrated in the future are drawn out. Enabling complete user control over his data, anonymising or encrypting the sensitive data before outsourcing, notifying the data owner upon data access, altogether with the tied up security mechanisms would nullify the privacy issue. This would serve as a helping note in the progress of strengthening the privacy preserving approaches in Cloud Computing.

Keywords

Cloud Computing, Privacy Preserving, Access Control, Public Auditing
User

  • Wang J, Zhao Y et al. (2009). Providing Privacy Preserving in cloud computing, International Conference on Test and Measurement, vol 2, 213-216.
  • Greveler U, Justus b et al. (2011). A Privacy Preserving System for Cloud Computing, 11th IEEE International Conference on Computer and Information Technology, 648-653.
  • Zhou M, Mu Y et al. (2011). Privacy-Preserved Access Control for Cloud Computing, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83-90.
  • Chadwick D W, and Fatema K (2012). A privacy preserving authorisation system for the cloud, Journal of Computer and System Sciences, vol 78(5), 1359-1373.
  • Sayi T J V R K M K, Krishna R K N S et al. (2012). Data Outsourcing in Cloud Environments: A Privacy Preserving Approach, 9th International Conference on Information Technology- New Generations, 361-366.
  • Rahaman S M, and Farhatullah M (2012). PccP: A Model for Preserving Cloud Computing Privacy, International Conference on Data Science & Engineering (ICDSE), 166-170.
  • Waqar A, Raza A et al. (2013). A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata, Journal of Network and Computer Applications, vol 36(1), 235-248.
  • Wang C, Wang Q et al. (2010). Privacy-Preserving Public Auditing for Storage Security in Cloud Computing, Proceedings IEEE INFOCOM’10.
  • Wang C, Chow S S M et al. (2013). Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, vol 62(2), 362-375.
  • Wang B, Li B et al. (2012). Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Fifth International Conference on Cloud Computing, 295-302.
  • Gellman R (2009). WPF REPORT: Privacy in the clouds: Risks to privacy and confidentiality from cloud computing.
  • Rong C, Nguyen S T et al. (2013). Beyond lightning: A survey on security challenges in cloud computing , Computers & Electrical Engineering, vol 39(1), 47-54.
  • Takabi H (2010). Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, vol 8(6), 24-31.
  • Xiao Z, and Xiao Y. Security and Privacy in Cloud Computing, IEEE Communications Surveys & Tutorials, vol PP(99), 1-17.

Abstract Views: 724

PDF Views: 0




  • Privacy Preserving Approaches in Cloud: a Survey

Abstract Views: 724  |  PDF Views: 0

Authors

T. Jothi Neela
School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, India
N. Saravanan
School of Computing, SASTRA University, Thanjavur, 613401, Tamilnadu, India

Abstract


Cloud Computing is continuously evolving and showing consistent growth in the field of computing. But, the security issues and threats associated with it still stay as a cumbersome. The focal point of this paper is Privacy preserving in cloud computing. This paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, anonymising data, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud data. The surveyed approaches are showcased and compared with one another, stating their pros and cons. Finally, the results are centralized and the issues to be concentrated in the future are drawn out. Enabling complete user control over his data, anonymising or encrypting the sensitive data before outsourcing, notifying the data owner upon data access, altogether with the tied up security mechanisms would nullify the privacy issue. This would serve as a helping note in the progress of strengthening the privacy preserving approaches in Cloud Computing.

Keywords


Cloud Computing, Privacy Preserving, Access Control, Public Auditing

References





DOI: https://doi.org/10.17485/ijst%2F2013%2Fv6i5%2F33258