Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

被引:0
|
作者
Stewart Kirubakaran S. [1 ]
Arunachalam V.P. [1 ]
Karthik S. [1 ]
Kannan S. [2 ]
机构
[1] Department of Computer Science & Engineering, SNS College of Technology, Tamilnadu, Coimbatore
[2] School of Computing Science and Engineering, Vellore Institute of Technology, Madhya Pradhesh, Bhopal
来源
关键词
cloud computing; cloud security; cloud service provider (CSP); data security; data user (DU); efficient auditing technique (EAT); privacy-preserving; Third-party auditor (TPA);
D O I
10.32604/csse.2023.026690
中图分类号
学科分类号
摘要
In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security- related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured in this work with the Efficient Authentication Technique (EAT) using the Group Signature method that is applied with Third-Party Auditor (TPA). The role of the auditor is to secure the data and guarantee shared data integrity. Additionally, the Cloud Service Provider (CSP) and Data User (DU) can also be the attackers that are to be handled with the EAT. Here, the major objective of the work is to enhance cloud security and thereby, increase Quality of Service (QoS). The results are evaluated based on the model effectiveness, security, and reliability and show that the proposed model provides better results than existing works. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1881 / 1895
页数:14
相关论文
共 50 条
  • [1] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [2] Efficient privacy-preserved data query over ciphertext in cloud computing
    Song, Wei
    Peng, Zhiyong
    Wang, Qian
    Cheng, Fangquan
    Wu, Xiaoxin
    Cui, Yihui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 1049 - 1065
  • [3] A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
    Al Mayyahi, Mustafa Azeez
    Seno, Seyed Amin Hosseini
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1572 - 1580
  • [4] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [5] Privacy Preserved Entrust Mechanism in Cloud Computing Environment
    Park, Jongyoul
    Lee, Seungyun
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 653 - 658
  • [6] Research on Security and Privacy of Big Data under Cloud Computing Environment
    Zhang Maohong
    Yang Aihua
    Liu Hui
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 52 - 55
  • [7] Towards DNA based data security in the cloud computing environment
    Namasudra, Suyel
    Devi, Debashree
    Kadry, Seifedine
    Sundarasekar, Revathi
    Shanthini, A.
    COMPUTER COMMUNICATIONS, 2020, 151 : 539 - 547
  • [8] Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs
    Zheng, Xu
    Cai, Zhipeng
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (05) : 968 - 979
  • [9] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [10] Privacy-preserved Secure Medical Data Sharing Using Hierarchical Blockchain in Edge Computing
    Emon R.I.
    Onik M.M.H.
    Al Hussain A.
    Tanna T.A.
    Emon M.A.
    Rifat M.A.A.
    Miraz M.H.
    Annals of Emerging Technologies in Computing, 2022, 6 (04) : 38 - 48