Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions

被引:41
|
作者
Sun, Pan Jun [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
关键词
Cloud computing; privacy; access control; attribute-based encryption; trust; ATTRIBUTE-BASED ENCRYPTION; PROXY RE-ENCRYPTION; DATA ACCESS-CONTROL; KEYWORD RANKED SEARCH; TRUST MANAGEMENT; CONTROL SYSTEM; REPUTATION; CIPHERTEXT; EFFICIENT; POLICY;
D O I
10.1109/ACCESS.2019.2946185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified logic. In this paper, we systematically review and analyze relevant research achievements. First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multi-authority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable encryption(SE), trust, reputation, extension of tradition access control and hierarchical key; third, we propose the research challenge and future direction of the privacy protection in the cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies.
引用
收藏
页码:147420 / 147452
页数:33
相关论文
共 50 条
  • [1] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [2] A survey of security and privacy challenges in cloud computing: Solutions and future directions
    Liu, Yuhong
    Sun, Yan
    Ryoo, Jungwoo
    Rizvi, Syed
    Vasilakos, Athanasios V.
    [J]. Journal of Computing Science and Engineering, 2015, 9 (03) : 119 - 133
  • [3] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [4] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [5] Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection
    Shariati, S. Mandi
    Abouzarjomehri
    Ahmadzadegan, M. Hossein
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1078 - 1082
  • [6] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [7] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [8] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [9] Data Security and Privacy Protection for Cloud Storage: A Survey
    Yang, Pan
    Xiong, Naixue
    Ren, Jingli
    [J]. IEEE ACCESS, 2020, 8 : 131723 - 131740
  • [10] Cloud Computing Security Challenges & Solutions-A Survey
    Basu, Srijita
    Bardhan, Arjun
    Gupta, Koyal
    Saha, Payel
    Pal, Mahasweta
    Bose, Manjima
    Basu, Kaushik
    Chaudhury, Saunak
    Sarkar, Pritika
    [J]. 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 347 - 356