Analysis on Privacy Preserving and Data Security for Cloud Data Storage

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-60 Number-3
Year of Publication : 2018
Authors : Dr. Amit Kr. Chaturvedi, Meetendra Singh Chahar, Dr. Kalpana Sharma
  10.14445/22312803/IJCTT-V60P123

MLA

Dr. Amit Kr. Chaturvedi, Meetendra Singh Chahar, Dr. Kalpana Sharma "Analysis on Privacy Preserving and Data Security for Cloud Data Storage". International Journal of Computer Trends and Technology (IJCTT) V60(3):151-156 June 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Cloud computing provides massive computation power and storage capacity, which enable users to deploy applications without infrastructure investment. Another advantage of using the cloud services are the scalability, accessibility, and maintainability from anywhere, anytime. Many services existing on the cloud servers because of economic benefits and operational convenience. So, Privacy-preserving security solutions for cloud services are always a point of discussion and need to secure the personal sensitive data of the individuals or institutions. In this paper, we analyze current privacy preserving solutions for cloud services and summarize in the section 4 - Important Findings. The various solutions proposed includes application of encryption on the data, anonymous authentication for registered users, quasi-identifier index based approach for privacy preservation over incremental data sets, non-bilinear group signature scheme, etc.

Reference
[1] Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen, “An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud”, Journal of Computer and System Sciences 79 (2013), Elsevier, pp. 542–555
[2] Vanga Odelu, Ashok Kumar Das, Adrijit Goswami, “A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system”, Journal of King Saud University – Computer and Information Sciences (2016) 28, pp. 68–81
[3] L. Malina*, J. Hajny, P. Dzurenda and V. Zeman, “Privacy-preserving security solution for cloud services”, Journal of Applied Research and Technology, Science direct, Volume 13, Issue 1, February 2015, Pages 20-31
[4] D. Chandramohan, T. Vengattaraman, D. Rajaguru, P. Dhavachelvan, “A new privacy preserving technique for cloud service user endorsement using multi-agents”, Journal of King Saud University – Computer and Information Sciences (2016) vol. 28, pp. 37–54
[5] Y. A. A. S. Aldeen, M. Salleh, Y. Aljeroudi, “An innovative privacy preserving technique for incremental datasets on cloud computing”, Elsevier, Journal of Biomedical Informatics, vol. 62 (2016), pp. 107–116
[6] Jian Wang Yan Zhao Shuo Jiang Jiajin Le, “Providing Privacy Preserving in cloud computing”, 2009 IEEE International Conference on Test and Measurement, ISSN 978-1-4244-4700-8, pp. 213-216
[7] N.M. Joseph, E. Daniel, N.A. Vasaanthi, “Survey on Privacy-Preserving Methods for Storage in Cloud Computing”, Amrita International Conference of Women in Computing (AICWIC’13), Proceedings published by International Journal of Computer Applications® (IJCA), pp. 1-4
[8] Dr. K. Kartheeban, A. Durai Murugan, “Privacy Preserving Data Storage Technique in Cloud Computing”, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING.
[9] Hui Wang, “Privacy-Preserving Data Sharing in Cloud Computing”, JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, vol. 25, issue 3, pp. 401-414 May 2010
[10] Ms. P. R. Bhuyar, Dr. A. D. Gawande, Prof. A. B. Deshmukh, “Horizontal Fragmentation Techniques in Distributed Database”, International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012
[11] N. Vurukonda, B.T. Roa, “A study on Data Storage Security Issues in Cloud Computing”, presented in the 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), published in Elsevier, Procedia Computer Science, vol. 92 ( 2016 ), pp. 128 – 135
[12] S. Sehgal, S. Chaudhry, P. Biswas, S. Jain, “A New Genre Of Recommender Systems Based On Modern Paradigms Of Data Filtering”, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Procedia Computer Science, vol. 92 ( 2016 ), pp. 562 – 567
[13] M. B. Jayalekshmi and S. H. Krishnaveni, “A Study of Data Storage Security Issues in Cloud Computing”, Indian Journal of Science and Technology, Vol 8 (24), 2015, pp. 1-5.
[14] Akhil K.M., Praveen Kumar M, Pushpa B.R, “Enhanced Cloud Data Security Using AES Algorithm”, 2017, International Conference on Intelligent Computing and Control (I2c2)
[15] M. Derfouf, A. Mimouni, M. Eleuldj, “Vulnerabilities and storage security in Cloud Computing”, 2015, IEEE conference, ISSN : 978-1-4673-8149-9

Keywords
Privacy , data security, cloud data storage, anonymizing user identification.