Analysing Security and Privacy Management For Cloud Computing Environment

被引:6
|
作者
Gourkhede, Manish H. [1 ]
Theng, Deepti P. [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
关键词
Digital rights management; cloud computing; privacy; security; Trusted Third Party;
D O I
10.1109/CSNT.2014.142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Right Management (DRM) is a system for protecting the digital rights of the copyrighted data which is widely distributed through the internet or other means of digital media by permitting secure distribution and preventing from illegal distribution of the copyrighted data. Cloud computing is an emerging technology where a huge amount of data is stored from all around the world, from different countries and Organizations. Thus it is important to secure and protect the confidentiality of this data and also to preserve the privacy of the user who is using this technology, so that no one can reveal their personnel information and identity even their own Cloud Service Provider (CSP). In This Paper a comparative analysis of the various schemes is presented, most of them rely on a Trusted Third Party (TTP), but even the TTP can be malicious. To overcome the drawbacks an enhanced scheme is proposed which preserve both the digital rights of the content and privacy of the user without relying on TTP. Comparative analysis shows that proposed scheme is better than other techniques which are mentioned in this paper & suitable for upcoming Cloud based Systems.
引用
下载
收藏
页码:677 / 680
页数:4
相关论文
共 50 条
  • [31] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [32] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [33] Security and Privacy Challenges in Vehicular Cloud Computing
    Lu, Rongxing
    Rahulamathavan, Yogachandran
    Zhu, Hui
    Xu, Chang
    Wang, Miao
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [34] Cloud computing security and privacy: Standards and regulations
    Yu, Yong
    Miyaji, Atsuko
    Au, Man Ho
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 1 - 2
  • [35] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [36] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich, Mark
    COMMUNICATIONS OF THE ACM, 2024, 67 (01) : 52 - 53
  • [37] Security and Privacy in Cloud Computing: Technical Review
    Abdulsalam, Yunusa Simpa
    Hedabou, Mustapha
    FUTURE INTERNET, 2022, 14 (01)
  • [38] Confidential Computing: Elevating Cloud Security and Privacy
    Russinovich M.
    Queue, 2023, 21 (04): : 44 - 48
  • [39] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [40] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186