Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing

被引:0
|
作者
Singsit, Lamminthang [1 ]
Ashok, Marie Stanislas [2 ]
机构
[1] Pondicherry Univ, Sch Engn & Technol, Dept Comp Sci, Pondicherry, India
[2] Pondicherry Univ, Pondicherry, India
关键词
Cloud computing; Outsourced Data; Data Security and Privacy; confidentiality; Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
the main idea behind Cloud computing is to store data and other resources remotely in the cloud and accessed it anytime from anywhere through devices such as mobile devices, laptops and personal computers and any other thin client devices. This offers many advantages, like data ubiquity, flexibility of access, better performance and low start up cost. This in many ways improves the security as the cloud service provider is able to invest more in enforcing up-to date security technologies and practices than the data owner. However, this introduces new challenges with respect to ensuring the data security and the privacy. The main threat or disadvantage is that the data owner solely depends on the trustworthiness of the service provider who may not always be trustworthy. Thus, there is the need to ensure that customers data privacy and integrity are maintained. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider needs to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these privacy issues. Approaches based on two layers of encryption alleviate the privacy concern the disadvantage of this technique is that it still require re-encryption of the data when there is a change in the access policies. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key. Changes to the access control policies are handled by re-encrypting the object containing the affected key, which is an efficient operation compared to re-encrypting the whole data or information.
引用
收藏
页码:42 / 47
页数:6
相关论文
共 50 条
  • [1] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
    Dawson, John Kwao
    Twum, Frimpong
    Acquah, James Benjamin Hayfron
    Missah, Yaw Marfo
    [J]. PLOS ONE, 2023, 18 (02):
  • [2] Ensuring Online Data Privacy and Controlling Anonymity
    Axelrod, C. Warren
    [J]. 2015 12TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2015,
  • [3] Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing
    Sujana, J. Angela Jennifa
    Revathi, T.
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 96 - 100
  • [4] Improving the Security by using Various Cryptographic Techniques in Cloud Computing
    Jain, Gaurav
    Sejwar, Vikas
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 23 - 28
  • [5] An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
    Agarkhed, Jayashree
    Ashalatha, R.
    Patil, Siddarama R.
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [6] Cloud Computing: Preserving Data Privacy and Managing Access Control
    Giweli, Nabil
    Shahrestani, Seyed
    Cheung, Hon
    [J]. INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
  • [7] Fine-Grained Access Control ensuring Data Privacy in OpenStack Cloud
    John, Naveen Thomas M.
    Thomas, Manoj V.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1669 - 1674
  • [8] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
  • [9] Cryptographic techniques that combine data protection and ease of utilization in the cloud computing era
    [J]. Fuji, H., 1600, Nippon Telegraph and Telephone Corp. (10):
  • [10] Ensuring Data Integrity in Cloud Computing
    Kumarga, N. Praveen
    Sireesha, D.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 34 - 38