A Survey on Data Confidentiality and Privacy in Cloud Computing

被引:7
|
作者
Aloraini, Afnan [1 ]
Hammoudeh, Mohammad [1 ]
机构
[1] Manchester Metropolitan Univ, Manchester M1 5JD, Lancs, England
关键词
Cloud computing; confidentiality; encryption; decryption; cryptography; WIRELESS SENSOR NETWORKS; SERVICE;
D O I
10.1145/3102304.3102314
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is often referred to as the technology of the decade. Current Cloud systems present critical limitations to protecting users' data confidentiality. This survey presents a review of the three essential data security attributes in the context of Cloud computing, namely, availability, integrity and confidentiality. It explores numerous research efforts to enhance the security and privacy of data in the Cloud with a focus on maintaining data confidentiality. Recent solutions are critically analysed, and their advantages and limitations are discussed. The paper finishes with a discussion on the future research opportunities and challenges on data confidentiality in the Cloud.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Data Obfuscation for Privacy and Confidentiality in Cloud Computing
    Khan, Khaled M.
    Shaheen, Mahboob
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 195 - 196
  • [2] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [3] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [4] Data Privacy in Cloud Computing
    EL-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Chrif
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), 2018, : 25 - 28
  • [5] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [6] A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing
    Kavya, V
    Sumathi, R.
    Shwetha, A. N.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 108 - 118
  • [7] Empowering Users of Cloud Computing on Data Confidentiality
    Khan, Khaled Md
    Shaheen, Mahboob
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 272 - 274
  • [8] Data confidentiality using fragmentation in cloud computing
    Hudic, Aleksandar
    Islam, Shareeful
    Kieseberg, Peter
    Rennert, Sylvi
    Weippl, Edgar R.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2013, 9 (01) : 37 - +
  • [9] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    [J]. IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [10] Data Privacy and Trust in Cloud Computing
    Cheng, Kai
    [J]. ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2022, 74 (04) : 745 - 746