DCaP—Data Confidentiality and Privacy in Cloud Computing: Strategies and Challenges

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 705)

Abstract

Cloud computing is one of the revolutionary technology for individual users due to its availability of on-demand services through the sharing of resources. This technology avoids the in-house infrastructure construction, cost of infrastructure and its maintenance. Hence individual users and organizations are moving towards cloud to outsource their data and applications. But many individuals are worried about the privacy and confidentiality of their data before sharing into cloud. The Cloud service provider has to ensure data security against unauthorized access in and out of the cloud computing infrastructure. Hence this paper identifies and describes the possible threats on Data confidentiality and privacy. The author also presents the anatomy and summary of general observations made on the available mechanisms to counter these threats.

Keywords

Cloud computing Data security Confidentiality Privacy Encryption Cloud data security 

References

  1. 1.
    Al-Jaberi, M.F., Zainal, A.: Data integrity and privacy model in cloud computing. In: 2014 International Symposium on, Biometrics and Security Technologies (ISBAST), pp. 280–284. IEEE (2014)Google Scholar
  2. 2.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Asiacrypt, vol. 2894, pp. 452–473. Springer (2003)Google Scholar
  3. 3.
    Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: Sedasc: secure data sharing in clouds. IEEE Syst. J. (2015)Google Scholar
  4. 4.
    Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security. In: 2014 International Conference on, Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE (2014)Google Scholar
  5. 5.
    Babitha, M., Babu, K.R.: Secure cloud storage using aes encryption. In: International Conference on, Automatic Control and Dynamic Optimization Techniques (ICACDOT), pp. 859–864. IEEE (2016)Google Scholar
  6. 6.
    Balasaraswathi, V., Manikandan, S.: Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In: 2014 International Conference on, Advanced Communication Control and Computing Technologies (ICACCCT), pp. 1190–1194. IEEE (2014)Google Scholar
  7. 7.
    Bensitel, Y., Romadi, R.: Secure data storage in the cloud with homomorphic encryption. In: 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), pp. 1–6. IEEE (2016)Google Scholar
  8. 8.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)Google Scholar
  9. 9.
    Go, W., Kwak, J.: Dual server-based secure data-storage system for cloud storage. Int. J. Eng. Syst. Model. Simul. 1 6(1–2), 86–90 (2014)Google Scholar
  10. 10.
    Iliana, I., Daneva, M.: Cloud computing security requirements: a systematic review. In: 2012 Sixth International Conference on, Research Challenges in Information Science (RCIS), IEEEGoogle Scholar
  11. 11.
    Kumar, N.S., Lakshmi, G.R., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015)Google Scholar
  12. 12.
    Liu, H., Ning, H., Xiong, Q., Yang, L.T.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26(1), 241–251 (2015)Google Scholar
  13. 13.
    Marimuthu, K., Gopal, D.G., Kanth, K.S., Setty, S., Tainwala, K.: Scalable and secure data sharing for dynamic groups in cloud. In: 2014 International Conference on, Advanced Communication Control and Computing Technologies (ICACCCT), pp. 1697–1701. IEEE (2014)Google Scholar
  14. 14.
    Moghaddam, F.F., Yezdanpanah, M., Khodadadi, T., Ahmadi, M., Eslami, M.: VDCI: Variable data classification index to ensure data protection in cloud computing environments. In: 2014 IEEE Conference on Systems, Process and Control (ICSPC), pp. 53–57. IEEE (2014)Google Scholar
  15. 15.
    Nimje, A.R., Gaikwad, V., Datir, H.: Attribute-based encryption techniques in cloud computing security: an overview. Int. J. Comput. Trends Technol. (2013)Google Scholar
  16. 16.
    Prasad, K., Poonam, J., Gauri, K., Thoutam, N.: Data sharing security and privacy preservation in cloud computing. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1070–1075. IEEE (2015)Google Scholar
  17. 17.
    Saroj, S.K., Chauhan, S.K., Sharma, A.K., Vats, S.: Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 202–207. IEEE (2015)Google Scholar
  18. 18.
    Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)Google Scholar
  19. 19.
    Sirohi, P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 115–118. IEEE (2015)Google Scholar
  20. 20.
    Tseng, Y.M., Tsai, T.T., Huang, S.S., Huang, C.P.: Identity-based encryption with cloud revocation authority and its applications. IEEE Trans. Cloud Comput. (2016)Google Scholar
  21. 21.
    Wei, J., Liu, W., Hu, X.: Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans. Cloud Comput. (2016)Google Scholar
  22. 22.
    Wikipedia, f.e.: Homomorphic encryption. https://en.wikipedia.org/wiki/Homomorphic_encryption
  23. 23.
    Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012)Google Scholar
  24. 24.
    Zhou, S., Du, R., Chen, J., Deng, H., Shen, J., Zhang, H.: SSEM: Secure, scalable and efficient multi-owner data sharing in clouds. China Commun. 13(8), 231–243 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.AJ Institute of Engineering & Technology Mangaluru, Visvesvaraya Technological University BelagaviBelgaumIndia
  2. 2.Canara Engineering College Mangaluru, Visvesvaraya Technological University BelagaviBelgaumIndia

Personalised recommendations