Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

被引:0
|
作者
Stewart Kirubakaran S. [1 ]
Arunachalam V.P. [1 ]
Karthik S. [1 ]
Kannan S. [2 ]
机构
[1] Department of Computer Science & Engineering, SNS College of Technology, Tamilnadu, Coimbatore
[2] School of Computing Science and Engineering, Vellore Institute of Technology, Madhya Pradhesh, Bhopal
来源
关键词
cloud computing; cloud security; cloud service provider (CSP); data security; data user (DU); efficient auditing technique (EAT); privacy-preserving; Third-party auditor (TPA);
D O I
10.32604/csse.2023.026690
中图分类号
学科分类号
摘要
In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security- related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured in this work with the Efficient Authentication Technique (EAT) using the Group Signature method that is applied with Third-Party Auditor (TPA). The role of the auditor is to secure the data and guarantee shared data integrity. Additionally, the Cloud Service Provider (CSP) and Data User (DU) can also be the attackers that are to be handled with the EAT. Here, the major objective of the work is to enhance cloud security and thereby, increase Quality of Service (QoS). The results are evaluated based on the model effectiveness, security, and reliability and show that the proposed model provides better results than existing works. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1881 / 1895
页数:14
相关论文
共 50 条
  • [41] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [42] Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
    Gupta, B. B.
    Yamaguchi, Shingo
    Agrawal, Dharma P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 9203 - 9208
  • [43] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [44] Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment
    Bingu, Rajesh
    Jothilakshmi, S.
    Srinivasu, N.
    INFORMATION SECURITY JOURNAL, 2024, 33 (01): : 1 - 15
  • [45] A combined approach to ensure data security in cloud computing
    Sood, Sandeep K.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1831 - 1838
  • [46] Towards Achieving Data Security with the Cloud Computing Adoption Framework
    Chang, Victor
    Ramachandran, Muthu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (01) : 138 - 151
  • [47] Towards analyzing data security risks in cloud computing environments
    Sangroya A.
    Kumar S.
    Dhok J.
    Varma V.
    Communications in Computer and Information Science, 2010, 54 : 255 - 265
  • [48] Towards Analyzing Data Security Risks in Cloud Computing Environments
    Sangroya, Amit
    Kumar, Saurabh
    Dhok, Jaideep
    Varma, Vasudeva
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 255 - 265
  • [49] Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust
    Sirohi, Preeti
    Agarwal, Amit
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 115 - 118
  • [50] Towards Cloud based Smart Cities Data Security and Privacy Management
    Khan, Zaheer
    Pervez, Zeeshan
    Ghafoor, Abdul
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 806 - 811