Open Access   Article Go Back

Privacy Preservation and Auditing in Public Cloud: A Review

Nitesh Kumar Namdeo1 , Sachin Choudhari2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-3 , Page no. 124-127, Mar-2016

Online published on Mar 30, 2016

Copyright © Nitesh Kumar Namdeo , Sachin Choudhari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nitesh Kumar Namdeo , Sachin Choudhari, “Privacy Preservation and Auditing in Public Cloud: A Review,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.124-127, 2016.

MLA Style Citation: Nitesh Kumar Namdeo , Sachin Choudhari "Privacy Preservation and Auditing in Public Cloud: A Review." International Journal of Computer Sciences and Engineering 4.3 (2016): 124-127.

APA Style Citation: Nitesh Kumar Namdeo , Sachin Choudhari, (2016). Privacy Preservation and Auditing in Public Cloud: A Review. International Journal of Computer Sciences and Engineering, 4(3), 124-127.

BibTex Style Citation:
@article{Namdeo_2016,
author = {Nitesh Kumar Namdeo , Sachin Choudhari},
title = {Privacy Preservation and Auditing in Public Cloud: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2016},
volume = {4},
Issue = {3},
month = {3},
year = {2016},
issn = {2347-2693},
pages = {124-127},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=840},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=840
TI - Privacy Preservation and Auditing in Public Cloud: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Nitesh Kumar Namdeo , Sachin Choudhari
PY - 2016
DA - 2016/03/30
PB - IJCSE, Indore, INDIA
SP - 124-127
IS - 3
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1835 1512 downloads 1503 downloads
  
  
           

Abstract

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is a general term for the delivery of hosted services over the internet. Cloud computing enables companies to consume the resources and compute their utility rather than building and maintaining computing infrastructure. A cloud database is a database that has been optimized or built for a virtualized computing environment. Since these data-centers may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. Cloud has been prone to various security issues like storage, computation and attacks like Denial of service, Distributed Denial of Service, Eavesdropping, insecure authentication or logging etc. Privacy preservation is main security issue in public cloud. This paper focuses on various security mechanisms that are provided in the enterprises and also discusses few of the common security mechanisms like auditing, authentication, authorization, encryption and access control.

Key-Words / Index Term

Cloud database, Security, Privacy Preservation, Auditing, Authentication, DaaS

References

[1] Peter Mell,TimothyGrance,”The NIST definition of cloud computing”,http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[2] InduArora ,Dr.AnuGupta, “Cloud database: A paradigm shift in Databases”, IJCI ,july 2012.
[3] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging it platforms: Vision, hype, andreality for delivering computing as the 5th utility,” Future GenerationComput. Syst., vol. 25, no. 6, pp. 599–616, 2009.
[4] Suraj S. Gaikwad, Amar R. Buchade, "Survey on Securing data using Homomorphic Encryption in Cloud Computing.", International Journal of Computer Sciences and Engineering, Volume-04, Issue-01, Page No (17-21), Jan -2016
[5]Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
[6] Boyang Wang, Baochun Li and Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing, Vol. 2, No. 1, January-March 2014, Pp. 43-57
[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-610, 2007.
[8] H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90- 107, 2008.
[9] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
[10] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security (ESORICS’09), pp. 355-370, 2009.
[11] C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality ofService (IWQoS’09), pp. 1-9, 2009.
[12] B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-Based Distributed Storage Systems,” Proc. ACM Workshop Cloud Computing Security Workshop (CCSW’10), pp. 31-42, 2010.
[13] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S Yau, “Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,” Proc. ACM Symp. Applied Computing (SAC’11), pp. 1550-1557, 2011.
[14] N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-Based Secure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM, 2012.
[15] C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.