An Analysis on Privacy Preserving in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :Jithin S, Dr. P. Sujatha

MLA

Jithin S, Dr. P. Sujatha "An Analysis on Privacy Preserving in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V4(6):1557-1563 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Cloud computing has brought a new way that organizations store and manage their data, due to reduced cost, robustness and ubiquitous nature. It offers the promise of massive cost savings along with increased IT agility. But the storage and access of sensitive data in cloud computing is an important issue to consider. Still many organizations are not fully confident to have the benefits of the cloud, pointing problems regarding data loss and unauthorized access, and are reluctant to give faith on cloud providers to solve these challenges. This paper discusses some mechanisms and techniques which are used to preserve the privacy in cloud computing.

 

References-
[1] Miao Zhou , YiMu, Willy Susilo ,JunYan and Liju Dong, “Privacy enhanced data outsourcing in the cloud”, Journal of Network and Computer Applications ;1367–1373, Elsevier; January 2012.
[2] Ulrich Greveler, Benjamin Justus and Dennis Loehr, “A Privacy Preserving System for Cloud Computing” ,July 2011.
[3] Sandeep K.Sood, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications; 1831– 1838, Elsevier; July 2012.
[4] Nuno Santos, Krishna P. Gummadi and Rodrigo Rodrigues, “Towards Trusted Cloud Computing”, 2010.
[5] Dimitrios Zissis and Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems 28 (2012) 583– 592; Elsevier, 2012.
[6] Elisa Bertino, Federica Paci and Rodolfo Ferrini, “Privacy-preserving Digital Identity Management for Cloud Computing”.
[7] Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati, “A Data Outsourcing Architecture Combining Cryptography and Access Control”, ACM Workshop on Computer Security Architecture, Fairfax,Virginia, USA, November 2007.
[8] Chunming Rong, Son T. Nguyen and Martin Gilje Jaatun, “Beyond lightning: A survey on security challenges in cloud computing”, Computers and Electrical Engineering 39 (2013) 47–54, Elsevier, 2012.
[9] Wang W, Li Z, Owens R and Bhargava B, “Secure and efficient access to outsourced Data”, Proceedings of the 2009 ACM workshop on cloud computing security, CCSW ’09. 55–66 New York, NY, USA:ACM; 2009.
[10] Xiang Zou, Bing Chen and Bo Jin,” Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace”, 1160 – 1164, Elsevier; 2012.

Keywords —Tree based cryptographic key management, hash function, data storage, Digital Signatures, Virtualization and authentication mechanism