A Survey on Ensuring Data Confidentiality in Cloud Computing

Dileep Kumar Reddy P*, R. Praveen Sam**, Shoba Bindu C***
* Lecturer, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapuramu, India.
** Professor, Department of Computer Science and Engineering, G.P.R.E.C, Kurnool, India.
*** Associate professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapuramu,
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jcc.1.2.3052

Abstract

There is one internet technology that is growing very fast, that is nothing but cloud computing, which facilitates users to use resources without help of installation of any software. Cloud computing provides some information storage with its services. One of the challenges in the current research in cloud computing is Data confidentiality. User's private data is stored in third service party providers, who do operations on this data. So the risk of exposure of user's private data is high. Previous solutions to save the information mainly rely on cryptographic approaches. This paper gives information regarding some previous approaches to keep protection of the confidentiality of users.

Keywords

Cloud Computing, Data Confidentiality, Security, Encryption.

How to Cite this Article?

Reddy, P D. K., Sam, R. P. and Bindu, C. S. (2014). A Survey on Ensuring Data Confidentiality in Cloud Computing. i-manager’s Journal on Cloud Computing, 1(2), 13-19. https://doi.org/10.26634/jcc.1.2.3052

References

[1]. Pei-ShanChung, MinShiang, and Chi-Wei LiuHwang., (2014). ”A Study of Attribute-based Proxy Re encryption Scheme in Cloud Environments”, International Journal of Network Security, Vol.16, No.1, pp.1-13.
[2]. J.Geelan., (2008). ”Twenty one experts define cloud computing Virtualization”. ElectronicMag.
[3]. R.Buyya,C.S.Yeo, and S.Venugopal.,(2008). ”Market oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities”, 10th IEEE International Conference on High performance computing and communications, pp. 5-13.
[4]. Luis M. Vaquero, Luis Rodero Merino and Daniel Mora´n.,(2010). ”Locking the sky:a survey on IaaS cloud security”, Computing, DOI:10.1007/s00607-010-0140-x.
[5].Vascellaro JE (2009). ”Google disclose privacy glitch”. http://blogs.wsj.com/digits/2009/03/08/1214/
[6]. Aized Amin Soofi, M.Irfan Khan and Fazal-e- Amin.,(2014). “Encryption Techniques for Cloud Data Confidentiality”, International Journal of Grid Distribution Computing, Vol.7, No.4, pp.11-20.
[7]. Heiser J, Nicolett M.,(2009). ”Assessing the security risks of cloud computing”. Gartner Report.
[8]. http://whatis.tech target. com/ definition/ Confidentiality-integrity-and-availability-CIA
[9]. http://www.cloud-competence-center.com/ understanding /cloud-computing-security/
[10]. Eckert, Claudia.,(2009). IT-Sicherheit. Oldenbourg, th 6 .edition, pp. 1-981.
[11]. Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Edgar R. Weippl. (2012). ”Data Confidentiality using Fragmentation in Cloud Computing”,Int J.Communication Network and Distributed systems, Vol. 1, No. 3/4.
[12]. Yanpei Chen, Vern Paxson, and Randy H. Katz.,(2010). “Whats new about cloud computing security?”, Tech. Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley.
[13]. Wood K, Pereira E., (Nov.2010). “An Investigation into CLoud Configuration and Security ”, International Conference for Internet Technology and Secured Transactions, pp. 1-6.
[ 1 4 ] . Venkata Sravan Kumar Maddineni, Shivashanker Ragi. (2011). “Security Techniques for Protecting Data in Cloud Computing”, Master Thesis Electrical Engineering, pp. 1-75.
[15]. http://www.vormetric.com/sites/default/files/wpdata- security-in-the-cloud.pdf
[16]. U. Somani, K. Lakhani and M. Mundra.,(2010). ”Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing”, Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference, pp. 211-216.
[17]. W. Cong, C. Ning, L. Jin, R. Kui and L. Wenjing.,(2010). “Secure Ranked Keyword Search over Encrypted Cloud Data”, Distributed Computing Systems (ICDCS), IEEE 30th International Conference, pp. 253- 262.
[18]. H. Shuai and X. Jianchuan. (2011). ”Ensuring data storage security through a novel third party auditor scheme in cloud computing”, Cloud Computing and Intelligence Systems (CCIS), IEEE International Conference, pp. 264-268.
[19]. Vamsee and Sriram. (2011). “Data Security in Cloud Computing”, Journal of Mathematics and computer sciences”, Vol. 2, No. 1, pp. 15- 23.
[20]. S. K. Sood.,(2012). “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, Vol. 35, No. 6, pp. 1831- 1838.
[21]. E. M. Mohamed, H. S. Abdelkader and S. El- Etriby.,(2012). ”Enhanced data security model for cloud computing”, Informatics and Systems (INFOS), 2012 8th International Conference, pp. 12-17.
[22]. J. Singh, B. Kumar and A. Khatri.,(2012). “Improving stored data security in Cloud using Rc5 algorithm”, Engineering (NUiCONE), Nirma University International Conference, pp. 1-5.
[23]. Z. Lan, V. Varadharajan and M. Hitchens.,(2013). “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”, Information Forensics and Security, IEEE Transactions on, Vol. 8, No. 12, pp. 1947-1960.
[24]. J. Taeho, L. Xiang-Yang, W. Zhiguo and W. Meng.,(2013). “Privacy preserving cloud data access with multi-authorities”, INFOCOM, Proceedings IEEE, pp. 2625-2633.
[25]. Y. Ching-Nung and L. Jia-Bin. (2013). “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing”, Biometrics and Security Technologies (ISBAST), International Symposium, pp. 259-266.
[26]. P. Rewagad and Y. Pawar,.(2013). “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, Proceedings IEEE, pp. 437-439.
[27]. M. S. Abolghasemi, M. M. Sefidab and R. E. Atani,.(2013). “Using location based encryption to improve the security of data access in cloud computing”, Advances in Computing, Communications and Informatics (ICACCI), International Conference, pp.261- 265.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.