Advertisement

A Multi-Level Privacy Scheme for Securing Data in a Cloud Environment

  • Ezekiel K. Olatunji
  • Matthew O. Adigun
  • Paul Tarwireyi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 313)

Abstract

Privacy concern is often cited as one of the key factors that impede large-scale adoption of the cloud computing paradigm by enterprise customers. Existing solutions to privacy issue with respect to cloud computing, commonly through encryption mechanisms, often result in performance problem. This paper proposes and presents a multi-level privacy support scheme for addressing the trade-off between privacy of user’s data stored in the cloud and system performance. This is achieved by using encryption algorithms with varying strengths to protect the privacy of different categories of user’s data depending on their privacy sensitivity. Simulation results, using Jindael AES encryption algorithm as case study, lends credence to the efficacy of the proposed privacy scheme.

Keywords

Cloud computing Data privacy Encryption algorithm System performance 

Notes

Acknowlegement

This work is based on the research supported in part by the National Research Foundation of South Africa—Grant UID: TP11062500001 (2012–2014). The authors also acknowledge funds received from industry partners: Telkom SA Ltd, Huawei Technologies SA (Pty) Ltd and Dynatech Information Systems, South Africa in support of this research.

References

  1. 1.
    S. Subashini and V. A. Kavitha, A Survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1) (2011), 1-11.Google Scholar
  2. 2.
    I. Chuang, S. Li, K. Huang and Y. Kuo, An effective privacy protection scheme for cloud computing in 13th International Conference on Advanced Communication Technology (ICACT, 2011), IEEE, 260–265.Google Scholar
  3. 3.
    C. Morin, Y. Jegou, and G. Pierri, XtreemOS Grids to Contrail Clouds, ERCIM NEWS, No 83, October 2010, http://www.ercim.eu
  4. 4.
    A. K. Anbarasu, Cloud Reference Architecture, An Oracle White paper, 2012, Retrieved April 4, 2013, www.oracle.com/technetwork/…/oracle-wp-cloud-ref-arch-1883533.pdf
  5. 5.
    E. K. Olatunji, M. O. Adigun, E. Jembere, J. Oladosu and P. Tarwireyi, A Privacy-as-a-Service Model for Securing Data in the GUISET Environment. In proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC), 2013, Stellenbosch, South Africa.Google Scholar
  6. 6.
    R. Henson, N. Esteli-Zoder, J. Richey and A. Ho, “Data Privacy – Challenges and Solutions”, An Oracle White Paper, Oracle Corporation, USA, 2010. Accessed last 14 April 2013.Google Scholar
  7. 7.
    R. Ranchal et al, Protection of Identity Information in the cloud computing without Trusted Third party. In Reliable Distributed Systems, 2010 29th Symposium on (pp 368-372), IEEEGoogle Scholar
  8. 8.
    M. A. Vouk, Cloud computing—Issues, research and implementations,” in 30th International Conference on Information Technology Interfaces, (ITI, 2008), IEEE, 31–40.Google Scholar
  9. 9.
    R. Gellman, Privacy in the clouds: risks to privacy and confidentiality from cloud computing., in Proceedings of the World privacy forum, (2012). Retrieved May 9, 2013. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf
  10. 10.
    A. Cavoukian, Privacy in the clouds. Identity in the Information Society 1(1) (2008), 89-108.Google Scholar
  11. 11.
    W. Jansen, and T. Grace, Guidelines on Security and Privacy in public Cloud Computing. NIST special Publication, 2011, 800-144. DOI:http://csr.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
  12. 12.
    S. Pearson, and A. Charlesworth, Accountability as a way forward for privacy protection in the cloud. In Cloud computing. Springer Berlin Heidelberg, (2009), 131–144.Google Scholar
  13. 13.
    W. Itani, A. Kayssi and A. Chehab, Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. in Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, (DASC, 2009), IEEE, 711–716.Google Scholar
  14. 14.
    C. P. Ram and G. Sreenivaasan, Security as a service (sass): Securing user data by coprocessor and distributing the data. in Trendz in Information Sciences & Computing (TISC, 2010), IEEE, 152–155.Google Scholar
  15. 15.
    J. Kong, A practical approach to improve the data privacy of virtual machines. in 10th International Conference on Computer and Information Technology (CIT, 2010), IEEE, 936–941.Google Scholar
  16. 16.
    C. Ray and U. Ganguly, An approach for data privacy in hybrid cloud environment. in 2nd International Conference on Computer and Communication Technology (ICCCT, 2011), IEEE, 316-320.Google Scholar
  17. 17.
    H. Patel, D. Patel, J. Chaudhari, S. Patel and K. Prajapti, CUBE, Tradeoffs between Performance and Security of Cryptographic primitives Used in Storage as a Service for Cloud Computing, 3-5 September, 2012, Pune, Maharashtra, India; ACM, 978-1-4503-1185-4/12/09Google Scholar
  18. 18.
    M. R. Abbassy and B. Shanmugam, Enabling Data Hiding for Resouces Sharing in cloud computing Environments based on DNA Sequences, in IEEE world Congress on services, (WCS 2011), IEEE, 385–390.Google Scholar
  19. 19.
    D. Giry, NIST report on cryptographic key length and cryptoperiod (2012), 2013. Accessed last October 2, 2013, http:www.keylength.com/en/4/
  20. 20.
    T. Eisenbarth and S. Kumar, A survey of lightweight-cryptography implementations. Design & Test of Computers, IEEE, 24(6), (2007), 522-533.Google Scholar
  21. 21.
    A. Nadeen and M. Y. Javed, A Performance Comparison of data Encryption Algorithms, in Information and Technologies, 2005, ICICT 2005, First International Conference on (pp 84-89), IEEEGoogle Scholar
  22. 22.
    I. Landge, T. Bharmal and P. Narwankar, Encryption and Decryption of Data Using Twofish Algorithm, World Journal of Science and technology, 2012, 2(3), 157-161; ISSN:2231-2587. Available online at worldjournalofscience.com, Retrived last September 25, 2013Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Ezekiel K. Olatunji
    • 1
  • Matthew O. Adigun
    • 1
  • Paul Tarwireyi
    • 1
  1. 1.Department of Computer ScienceUniversity of ZululandKwadlangezwaSouth Africa

Personalised recommendations