Survey on Preserving Data Privacy in Cloud
Bincy Paul1 , M. Azath2
Section:Survey Paper, Product Type: Journal Paper
Volume-2 ,
Issue-12 , Page no. 57-61, Dec-2014
Online published on Dec 31, 2014
Copyright © Bincy Paul , M. Azath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Bincy Paul , M. Azath, “Survey on Preserving Data Privacy in Cloud,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.
MLA Style Citation: Bincy Paul , M. Azath "Survey on Preserving Data Privacy in Cloud." International Journal of Computer Sciences and Engineering 2.12 (2014): 57-61.
APA Style Citation: Bincy Paul , M. Azath, (2014). Survey on Preserving Data Privacy in Cloud. International Journal of Computer Sciences and Engineering, 2(12), 57-61.
BibTex Style Citation:
@article{Paul_2014,
author = {Bincy Paul , M. Azath},
title = {Survey on Preserving Data Privacy in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {57-61},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=333},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=333
TI - Survey on Preserving Data Privacy in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Bincy Paul , M. Azath
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 57-61
IS - 12
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3705 | 3435 downloads | 3594 downloads |
Abstract
Cloud computing is the future of information technology. It demonstrates all the big trends in the design and use of computer architectures. With cloud computing, it is necessary for data to be not only stored in the cloud but also shared across multiple users, when the data are sharing privacy breach of the data can occur. In cloud computing preserving data privacy is an important task because the data itself contains sensitive information. A basic solution for preserving data privacy is to encrypt the data, and then upload the encrypted data into the cloud. As next give a data access notification to the data owner, providing complete permission of control to the user over the data. Designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task. Oruta is the first privacy-preserving mechanism for shared data stored in the cloud. By using homomorphic authenticable ring structures, it gives privacy preserving public auditing for secure clouds to storage system. This survey analyzes various techniques for preserving shared data privacy in the cloud.
Key-Words / Index Term
Cloud computing, Data sharing, Privacy Preserving
References
[1] http://en.wikipedia.org/wiki/Cloud_computing
[2] Rong C, Nguyen S T et al. (2013). “Beyond lightning: A sur¬vey on security challenges in cloud computing”, Computers & Electrical Engineering, vol 39(1), 47–54.
[3] DananThilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo “Secure Data Sharing in the Cloud”
[4] Wang J, Zhao Y et al. (2009).” Providing Privacy preserving in cloud computing”, International Conference on Test and Measurement, vol 2, 213–216.
[5] Greveler U, Justus b et al. (2011). “A Privacy Preserving System for Cloud Computing”, 11th IEEE International Conference on Computer and Information Technology, 648–653.
[6] Zhou M, Mu Y et al. (2011).” Privacy-Preserved Access Control for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83–90.
[7] Chadwick D W, and Fatema K (2012). “A privacy preserving authorization system for the cloud”, Journal of Computer and System Sciences, vol 78(5), 1359–1373.
[8] Sayi T J V R K M K, Krishna R K N S et al. (2012) “Data Outsourcing in Cloud Environments: A Privacy Preserving Approach”, 9th International Conference on Information Technology- New Generations, 361–366
[9] Rahaman S M, and Farhatullah M (2012). “PccP: A Model for Preserving Cloud Computing Privacy”, International Conference on Data Science & Engineering (ICDSE), 166–170.
[10] Wang C, Wang Q et al. (2010). “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing”, Proceedings IEEE INFOCOM’
[11] Wang C, Chow S S M et al. (2013). “Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, vol 62(2), 362–375.
[12] Wang B, Li B et al. (2012).”Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE Fifth International Conference on Cloud Computing, 295-302
[13] Jithin, S., and P. Sujatha. "An Analysis on Privacy Preserving in Cloud Computing."
[14] Onankunju, Bibin K. "Access Control in Cloud Computing."
[15] T. Jothi Neela, and N. Saravanan, Privacy Preserving Approaches in Cloud: A survey, IJST, vol.6.