Layer-based Privacy and Security Architecture for Cloud Data Sharing

被引:11
|
作者
Gupta, Ishu [1 ]
Singh, Niharika [2 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra, Haryana, India
[2] Univ Teknol PETRONAS, Seri Iskandar, Perak, Malaysia
关键词
Cloud Computing; Data Leakage; Data Privacy; Data Sensitivity; Information Security; Guilty Client; PERSONAL HEALTH RECORDS; PROXY RE-ENCRYPTION; IMAGE WATERMARKING; ACCESS-CONTROL; INFORMATION; SCHEME;
D O I
10.24138/jcomss.v15i2.617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider for applying security over each document and then transfer it to the client, we proposed a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categories require different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity: public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layer-based approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret, and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
引用
收藏
页码:173 / 185
页数:13
相关论文
共 50 条
  • [41] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [42] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [43] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [44] A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center
    Qin, Peng
    Li, Wei
    Ding, Ke
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [45] Block Chain Based Data Security Sharing Network Architecture Research
    Wang J.
    Gao L.
    Dong A.
    Guo S.
    Chen H.
    Wei X.
    Gao, Lingchao (gaolingchao@sgitg.sgcc.com.cn), 1600, Science Press (54): : 742 - 749
  • [46] A Privacy Preserving Service Broker Architecture for Data Sharing
    Al-Neyadi, Fahed
    Abawajy, Jemal
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 450 - 458
  • [47] Layer-based cooperation for intrusion detection in mobile cloud environment
    Makhlouf, Amel Meddeb
    Ghribi, Saadia
    Zarai, Faouzi
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2023, 21 (03) : 365 - 384
  • [48] Layer-Based Communication-Efficient Federated Learning with Privacy Preservation
    Lian, Zhuotao
    Wang, Weizheng
    Huang, Huakun
    Su, Chunhua
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 256 - 263
  • [49] Privacy Protection and Security in eHealth Cloud Platform for Medical Image Sharing
    Vincent, Johann
    Pan, Wei
    Coatrieux, Gouenou
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 93 - 96
  • [50] Security and privacy designs based data encryption in cloud storage and challenges: A review
    Mogarala, Aruna Guruvaya
    Mohan, K. G.
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,