Open Access   Article Go Back

Survey on Preserving Data Privacy in Cloud

Bincy Paul1 , M. Azath2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 57-61, Dec-2014

Online published on Dec 31, 2014

Copyright © Bincy Paul , M. Azath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bincy Paul , M. Azath, “Survey on Preserving Data Privacy in Cloud,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.57-61, 2014.

MLA Style Citation: Bincy Paul , M. Azath "Survey on Preserving Data Privacy in Cloud." International Journal of Computer Sciences and Engineering 2.12 (2014): 57-61.

APA Style Citation: Bincy Paul , M. Azath, (2014). Survey on Preserving Data Privacy in Cloud. International Journal of Computer Sciences and Engineering, 2(12), 57-61.

BibTex Style Citation:
@article{Paul_2014,
author = {Bincy Paul , M. Azath},
title = {Survey on Preserving Data Privacy in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {57-61},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=333},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=333
TI - Survey on Preserving Data Privacy in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Bincy Paul , M. Azath
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 57-61
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3672 3406 downloads 3560 downloads
  
  
           

Abstract

Cloud computing is the future of information technology. It demonstrates all the big trends in the design and use of computer architectures. With cloud computing, it is necessary for data to be not only stored in the cloud but also shared across multiple users, when the data are sharing privacy breach of the data can occur. In cloud computing preserving data privacy is an important task because the data itself contains sensitive information. A basic solution for preserving data privacy is to encrypt the data, and then upload the encrypted data into the cloud. As next give a data access notification to the data owner, providing complete permission of control to the user over the data. Designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task. Oruta is the first privacy-preserving mechanism for shared data stored in the cloud. By using homomorphic authenticable ring structures, it gives privacy preserving public auditing for secure clouds to storage system. This survey analyzes various techniques for preserving shared data privacy in the cloud.

Key-Words / Index Term

Cloud computing, Data sharing, Privacy Preserving

References

[1] http://en.wikipedia.org/wiki/Cloud_computing
[2] Rong C, Nguyen S T et al. (2013). “Beyond lightning: A sur¬vey on security challenges in cloud computing”, Computers & Electrical Engineering, vol 39(1), 47–54.
[3] DananThilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo “Secure Data Sharing in the Cloud”
[4] Wang J, Zhao Y et al. (2009).” Providing Privacy preserving in cloud computing”, International Conference on Test and Measurement, vol 2, 213–216.
[5] Greveler U, Justus b et al. (2011). “A Privacy Preserving System for Cloud Computing”, 11th IEEE International Conference on Computer and Information Technology, 648–653.
[6] Zhou M, Mu Y et al. (2011).” Privacy-Preserved Access Control for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, 83–90.
[7] Chadwick D W, and Fatema K (2012). “A privacy preserving authorization system for the cloud”, Journal of Computer and System Sciences, vol 78(5), 1359–1373.
[8] Sayi T J V R K M K, Krishna R K N S et al. (2012) “Data Outsourcing in Cloud Environments: A Privacy Preserving Approach”, 9th International Conference on Information Technology- New Generations, 361–366
[9] Rahaman S M, and Farhatullah M (2012). “PccP: A Model for Preserving Cloud Computing Privacy”, International Conference on Data Science & Engineering (ICDSE), 166–170.
[10] Wang C, Wang Q et al. (2010). “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing”, Proceedings IEEE INFOCOM’
[11] Wang C, Chow S S M et al. (2013). “Privacy-Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, vol 62(2), 362–375.
[12] Wang B, Li B et al. (2012).”Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE Fifth International Conference on Cloud Computing, 295-302
[13] Jithin, S., and P. Sujatha. "An Analysis on Privacy Preserving in Cloud Computing."
[14] Onankunju, Bibin K. "Access Control in Cloud Computing."
[15] T. Jothi Neela, and N. Saravanan, Privacy Preserving Approaches in Cloud: A survey, IJST, vol.6.