Data Anonymization and Integrity Checking in Cloud Computing

被引:0
|
作者
George, Reenu Sara [1 ]
Sabitha, S. [1 ]
机构
[1] Coll Engn, Dept Comp Sci & Engn, Trivandrum, Kerala, India
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data storage in cloud has become a recent topic of interest in technology. An increasing number of clients store their important data in remote cloud servers, without even leaving a copy in their local computers. Sometimes, the clients must ensure that their data is not lost or corrupted. A lot of works have been done on designing remote data integrity checking protocols to ensure the correctness of stored data. But all these methods check the integrity of encrypted text or plain text. An important issue that arises after encryption is the difficulty in performing computations on encrypted data. Instead of encryption, anonymization of data can be done as a means of preserving privacy. Data anonymization is the process of changing data that will be used or published in a way that prevents the identification of key information. Anonymized data can be stored in a cloud and processed without concern that other individuals may capture the data. Intel performed data anonymization in cloud where anonymization takes place on the VMs sending the data and de anaonymization within a secure enclave. But, anonymization at the clients may take more of their computational power which is not feasible, especially for thin clients. A better efficient data anonymization scheme is proposed where anonymization and deanonymization is performed by the secure enclave so that computational power at the client is saved. Also, a scheme to check the integrity of anonymized data in cloud has been explored.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Trust establishment for data integrity checking in cloud computing
    [J]. Lu, J. (jinglu601@126.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [2] A Survey on the Integrity Checking of Outsourced Data In Cloud Computing
    Zhao, Haichun
    Zheng, Xuefeng
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1650 - 1656
  • [3] A Survey on Data Integrity Checking in Cloud
    Dong, Yihui
    Sun, Le
    Liu, Dengzhi
    Feng, Meng
    Miao, Tiantian
    [J]. 2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 109 - 113
  • [4] An Efficient Method for Checking the Integrity of Data in the Cloud
    Tan Shuang
    Tan Lin
    Li Xiaoling
    Jia Yan
    [J]. CHINA COMMUNICATIONS, 2014, 11 (09) : 68 - 81
  • [5] INTEGRITY CHECKING OVER ENCRYTED CLOUD DATA
    Mithuna, R.
    Suguna, M.
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [6] Ensuring Data Integrity in Cloud Computing
    Kumarga, N. Praveen
    Sireesha, D.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 34 - 38
  • [7] Cryptanalysis of an integrity checking scheme for cloud data sharing
    Zhang, Yuan
    Xu, Chunxiang
    Zhao, Jining
    Zhang, Xiaojun
    Wen, Junwei
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 68 - 73
  • [8] A Study on Remote Data Integrity Checking Techniques in Cloud
    Sasikala, C.
    Bindu, C. Shoba
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 43 - 48
  • [9] An Algorithm to Enhance Data Integrity in Cloud Computing
    Mothlabeng, Moloko P.
    Mathonsi, Topside E.
    Muchenje, Tonderai
    Du Plessis, Deon P.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 418 - 424
  • [10] Data Integrity and Privacy Model in Cloud Computing
    Al-Jaberi, Mohammed Faez
    Zainal, Anazida
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 280 - 284