Advertisement

Privacy Preservation in Cloud Computing with Double Encryption Method

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Cloud computing is advanced technology, which provides a road map to access the applications over the internet. It is a platform, where cloud consumer and data owner customize their applications through online. Due to storing vast amount of data on cloud, there may be many issues related to the security in cloud network. The major among them is the privacy preservation of the network that accesses the cloud network. So in order to address the problem, we proposed a double encryption method that increases privacy for storing and accessing resources on cloud platform. The proposed method provides authentication and privacy features to data owner, cloud service providers and cloud users.

Keywords

Authentication Cloud computing Data center Security Privacy 

References

  1. 1.
    Sriram Natarajan, and Tilman Wolf, Network-Level Privacy for Hosted Cloud Services. IEEE Sponsored Second Int. Conference on Electronics and Communication Systems (ICECS 2015).Google Scholar
  2. 2.
    Subhash Chandra Patel, Ravi Shankar Singh and Sumit Jaiswal, Secure and Privacy Enhanced Authentication Framework for Cloud Computing. IEEE Sponsored Second Int. Conference on Electronics and Communication Systems (ICECS), 2015.Google Scholar
  3. 3.
    Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud computing: state-of-the-art and research challenges. Springer, J Internet Serv Appl (2010) 1: 7–18.Google Scholar
  4. 4.
    IC. Saravanakumar, and C. Arun, Survey on Interoperability, Security, Trust, Privacy Standardization of Cloud Computing. IEEE International Conference on Contemporary Computing and Informatics (IC3I), 2014.Google Scholar
  5. 5.
    Deepak Puthal, Sambit Mishra, and Satyabrata Swain, Cloud Computing Features, Issues and Challenges: A Big Picture. IEEE International Conference on Computational Intelligence & Networks, 2015.Google Scholar
  6. 6.
    Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez, An Analysis of Security Issues for Cloud Computing. Hashizume et al. Journal of Internet Services and Applications, Springer, 2013.Google Scholar
  7. 7.
    Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naslund and Makan Pourzandi, A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications,Springer,2012.Google Scholar
  8. 8.
    Dijiang Huang, Zhibin Zhou, Le Xu, Tianyi Xing and Yunji Zhong, Secure Data Processing Framework for Mobile Cloud Computing. IEEE INFOCOM Workshop on Cloud Computing, 2011.Google Scholar
  9. 9.
    Balasaraswathi V.R and Manikandan S, Enhanced Security for Multi-Cloud Storage using Cryptographic Data Splitting with Dynamic Approach. IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014.Google Scholar
  10. 10.
    Preeti Garg, and Dr. Vineet Shanna, An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function. IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014.Google Scholar
  11. 11.
    Tumpe Moyo, and Jagdev Bhogal, Investigating Security Issues in Cloud Computing. IEEE Eighth International Conference on Complex, Intelligent and Software Intensive Systems, 2014.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGM Institute of TechnologyDavanagereIndia
  2. 2.Department of Information Science and EngineeringJawaharalal Nehru College of EngineeringShivamoggaIndia

Personalised recommendations