PASA: Privacy-Aware Security Algorithm for Cloud Computing

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 182)


Security is one of the most challenging ongoing research area in cloud computing because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. This paper Proposed a new algorithm PASA (Privacy-Aware Security Algorithm) for cloud environment which includes the three different security schemes to achieve the objective of maximizing the data owners control in managing the privacy mechanisms or aspects that are followed during storage, Processing and accessing of different Privacy categorized data. The Performance analysis shows that the proposed algorithm is highly Efficient, Secure and Privacy aware for cloud environment.


privacy cloud computing cryptography security intercept detection data security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 978-1-4244-7932-0/10 ©, pp. 1–6. IEEE (2010)Google Scholar
  2. 2.
    Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy- aware data storage and processing in cloud computing architecture. In: 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing, 978-0-7695-3929-4/09 ©, pp. 711–717. IEEE (2009)Google Scholar
  3. 3.
    Panda, S.N., Kumar, G.: IDATA – An Effective Intercept Detection Algorithm for Packet Transmission in Trust Architecture (POT-2010-0006). Selected for publication in IEEE Potentials ISSN: 0278-6648Google Scholar
  4. 4.
    Gleeson, E.: Computing industry set for a shocking change (April 2009), MoneyWeek,
  5. 5.
    Jangra, A., Bala, R.: A Survey on various possible vulnerabilities and attacks in cloud computing environment. IJCBR 3(1) (January 2012) ISSN (Online): 2229-6166 Google Scholar
  6. 6.
    Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: Proc. of ACM Cloud Computing Security Workshop 2009, pp. 55–65 (2009)Google Scholar
  7. 7.
    di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007 (2007)Google Scholar
  8. 8.
    Gellman, R.: WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23 (2009)Google Scholar
  9. 9.
    Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: Proceedings of ICSE-Cloud 2009, Vancouver (2009)Google Scholar
  10. 10.
    Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. HP Labs Technical Report, HPL-2009178 (2009),
  11. 11.
    Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992)CrossRefGoogle Scholar
  12. 12.
    Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proc. of Financial Cryptography: Workshop on Real Life Cryptographic Protocols and Standardization (2010),

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Dept. of Computer Science & Engg.UIET, Kurukshetra UniversityKurukshetraIndia

Personalised recommendations