Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing

被引:0
|
作者
Singsit, Lamminthang [1 ]
Ashok, Marie Stanislas [2 ]
机构
[1] Pondicherry Univ, Sch Engn & Technol, Dept Comp Sci, Pondicherry, India
[2] Pondicherry Univ, Pondicherry, India
关键词
Cloud computing; Outsourced Data; Data Security and Privacy; confidentiality; Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
the main idea behind Cloud computing is to store data and other resources remotely in the cloud and accessed it anytime from anywhere through devices such as mobile devices, laptops and personal computers and any other thin client devices. This offers many advantages, like data ubiquity, flexibility of access, better performance and low start up cost. This in many ways improves the security as the cloud service provider is able to invest more in enforcing up-to date security technologies and practices than the data owner. However, this introduces new challenges with respect to ensuring the data security and the privacy. The main threat or disadvantage is that the data owner solely depends on the trustworthiness of the service provider who may not always be trustworthy. Thus, there is the need to ensure that customers data privacy and integrity are maintained. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider needs to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these privacy issues. Approaches based on two layers of encryption alleviate the privacy concern the disadvantage of this technique is that it still require re-encryption of the data when there is a change in the access policies. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key. Changes to the access control policies are handled by re-encrypting the object containing the affected key, which is an efficient operation compared to re-encrypting the whole data or information.
引用
下载
收藏
页码:42 / 47
页数:6
相关论文
共 50 条
  • [21] Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend
    Dawson, John Kwao
    Frimpong, Twum
    Acquah, James Benjamin Hayfron
    Missah, Yaw Marfo
    PLOS ONE, 2023, 18 (09):
  • [22] Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Wong, Duncan S.
    Li, Hui
    You, Ilsun
    INFORMATION SCIENCES, 2017, 379 : 42 - 61
  • [23] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [24] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [25] Data Privacy and Trust in Cloud Computing
    Cheng, Kai
    ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2022, 74 (04) : 745 - 746
  • [26] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [27] Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 342 - 347
  • [28] Ensuring Security and Privacy Preservation for Cloud Data Services
    Tang, Jun
    Cui, Yong
    Li, Qi
    Ren, Kui
    Liu, Jiangchuan
    Buyya, Rajkumar
    ACM COMPUTING SURVEYS, 2016, 49 (01)
  • [29] Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing
    Prabha, K. Mohana
    Saraswathi, P. Vidhya
    COMPUTER COMMUNICATIONS, 2020, 158 : 85 - 94
  • [30] An advanced cloud based framework for privacy and security in medical data using cryptographic method
    Welekar, Rashmi
    Shaikh, Farhadeeba
    Chitre, Abhijit
    Wanjale, Kirti
    Pathan, Shabana
    Kumar, Anil
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1585 - 1596