Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
JNNCE Journal of Engineering and Management
Cloud computing is one of the key computing platform and technology for sharing resources that may include infrastructure, software, applications, and business processes. Cloud computing incorporate within it data loss prevention, encryption, and authentication, as technologies aimed to support cloud environment. The main intention behind cloud computing is the work done on the client side that can be moved to some unseen cluster of resources over the internet. Context awareness is the process in which the system or system components gather information from its surroundings accordingly. It is responsible for collecting the data automatically and responds to the situation arising dynamically. The focus of this paper is on developing a Context Sensitive Privacy Provision Algorithm such that the encryption and decryption of the data can be done only at the user end but not at the server end so as to preserve context privacy of an individual.
IJARCCE, 2017
Cloud computing is a new concept of the modern world. Cloud computing combines all the services models and technologies together to deliver IT enterprise. The objective of this paper is to provide the security to end user to protect files or data from the unauthorized user. Privacy is an important issue for any technology through which unauthorized user can't access your file or data in a cloud. The main aim of this paper is to design and propose an architecture that can help to encrypt and decrypt algorithm. In this paper, we are presenting an encryption algorithm to deal with the privacy problems in cloud computing and protect the data stored in the cloud.
International Journal of Advanced Computer Science and Applications
With the widespread use of mobile phones and smartphone applications, protecting one's privacy has become a major concern. Because active defensive strategies and temporal connections between situations relevant to users are not taken into account, present privacy preservation systems for cell phones are often ineffective. This work defines secrecy maintenance issues similar to optimizing tasks, thereby verifying their accuracy and optimization capabilities through a hypothetical study. Many optimal issues arise while preserving one's privacy and these optimal issues are to be addressed as linear programming issues. By addressing linear programming issues, an effective context-aware privacy-preserving algorithm (CAPP) was created that uses an active defence strategy to determine how to release a user's current context to enhance the quality of service (QoS) regarding context-aware applications while maintaining secrecy. CAPP outperforms other standard methodologies in lengthy simulations of actual data. Additionally, the minimax learning algorithm (MLA) optimizes the policy users and improves the satisfaction threshold of the contextaware applications. Moreover, a cloud-based approach is introduced in the work to protect the user's privacy from third parties. The obtained performance measures are compared with existing approaches in terms of privacy policy breaches, context sensitivity, satisfaction threshold, adversary power, and convergence speed for online and offline attacks.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
Data leakage pose a serious threat to companies as the number of leakage incidents and the cost continues to increase. Data Leakage Prevention (DLP) has been studied to solve this information leakage. We propose a DLP solution applying context-based encryption concept, thus sensitive files are encrypted at all time. The cipher key is obtained through the execution of challenges based in the environment context and the company policies. In this paper, we explain the architecture and the design of our DLP system and the proposed challenges.
On the Move to Meaningful Internet Systems: OTM 2010, 2010
The paper presents a mechanism for privacy management developed for a distributed environment with the assumption that the nodes are subjected to severe resource constraints (processing power, memory). The basic idea is that the private data are filtered out in accordance with users' privacy policies before they become visible to other users. The decisions are highly localized which reduces the load related to privacy management on the computing nodes. The mechanism is hidden in middleware (the platform) and is transparent to the applications running on the nodes. The paper describes the problem and its solution in abstract terms and then presents the technical system which has been developed to demonstrate the proposed solution.
International Journal of Web Services Research, 2012
In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitiv...
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), 2006
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact. Much of this functionality depends on validating context information and using it for granting access to data or resources. In this paper we propose an encryption and access control framework that uses both context and identity to determine whether an entity or a group of entities may access protected services, data, devices, and other resources. We assume that the resources are context-sensitive, thus requiring the requesting entity to be under a specific context before it is able to access the resource or decrypt the information. Our approach is unique in the way that we decouple context from identity, which adds extra security, facilitates value-added services, and enables efficient key management for group communication.
2012 IEEE Fifth International Conference on Cloud Computing, 2012
This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in general, do not support encrypted data management. Therefore, CloudProtect strives to carry out the data transformations (encryption/decryption) in a manner that is transparent to the application, i.e., preserves all functionalities of the application, including those that require data to be in plaintext. Additionally, CloudProtect allows users flexibility in trading off performance for security in order to let them optimally balance their privacy needs and usage-experience.
cs.purdue.edu
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be significant and the heterogeneity of "users" represents an opportunity of multiple, collaborative threats. Problems associated with trusted 3 rd party managed Cloud Computing stem from loss of control, lack of trust (mechanisms) and multi-tenancy. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Cloud computing requires a user-centric access control where every user's request for any provider is accompanied with the user identity and entitlement information. The system creates digital identities for its users, and protects the users' Personally Identifiable Information (PII). User identity has identifiers or attributes that constitute PII, which identifies and defines the user. The identity is portable although tied to a domain. This user-centric approach gives the users the ultimate control of their digital identities. A review of the available privacy-enhancing solutions shows that there is a lack of standard system that address all the privacy issues in cloud computing. Cloud computing can benefit from the ownercentric mechanism for protecting privacy of sensitive data throughout their entire lifecycle. We discuss and propose approaches for privacy preservation in the cloud that does not use a trusted third party. The components of the proposed approach are: (i) use of active bundle-which is a middleware agent that includes data, privacy policies and a virtual machine that enforces the policies and use a set of protection mechanisms (i.e., integrity check, apoptosis, evaporation, decoy) to protect itself, as a container for PII; (ii) use of active bundle to mediates interactions between the user and cloud services using user's privacy policies; and (ii) use of predicate over encrypted data computing when negotiating a use of a cloud service.
Cloud computing is considered a new generation of technology that has offered many benefits such as flexibility, efficiency, reduction in IT cost and so on. However, the dependence on the cloud provider to process and manage the personal data leads to many privacy and confidentiality risks.. In this paper, we propose a framework that aims to evaluate if the cloud provider meets the privacy related issues. Moreover, this proposed framework helps the cloud provider to enhance the privacy provision level to increase the trust of customers on cloud provider services.
Lecture Notes in Business Information Processing, 2013
Bridging the gap between design and implementation stages has been a major concern that deplores designers, analysts and developers for quite a long time during the design and implementation of information systems in traditional environments. This issue grows to bigger dimension with the presence of cloud computing. Designing and modeling an Information System for the Cloud is a major and hard task that most of the traditional software engineering approaches fail to fulfill. In parallel, many respective organisations and respective researchers have highlighted a number of security and privacy challenges that are not present in traditional environments and need special attention when implementing or migrating information systems into a cloud environment. Thus, security and privacy are by themselves two areas that need special attention in the cloud era. This paper moves on to this direction. Specifically, it presents a number of privacy-oriented technical concepts that analysts need to consider when designing and modeling privacy-aware systems in a cloud environment. Also it suggest for every concept a number of implementation techniques that can assist developers in implementing the respective concepts.
2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), 2018
Cloud computing methodology is a conceptual based technology which is used widely nowaday. Cloud Computing is an emerging technology which offers an innovative business model for the organizations with massive data without upfront investment, but most of the organizations still hesitate to explore their business over cloud due to security issues. Data privacy protection and data retrieval control is one of the most challenging research works in cloud computing due to confidentiality of user data. Security is one of the major issues which hamper the growth of cloud. This Paper focuses on specific analysis of privacy preservation techniques, comparative analysis and challenges.
2014
Cloud is a very hot topic currently being discussed in the new era of technology. Organizations step back from adapting cloud technology mainly because of the security and privacy concerns. Processing or sharing privacy-sensitive data sets on cloud probably engenders severe privacy concerns because of multi-tenancy. Lack of transparency attack where the flow of client’s data is not known and disclosure attack where identity of the client is disclosed, are two major concerns of privacy preservation. This paper proposes a methodology of privacy preservation in cloud against the lack of transparency and disclosure through GSM module.
International Journal of Engineering and Advanced Technology, 2020
Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community's public key is changed to avoid abuse.
Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User's data are stored and maintained out of user's premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected properly from unauthorized access. This paper presents a survey on different privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.
Cloud Computing Applications and Techniques for E-Commerce, 2020
Cloud computing is a new technique that has been widely spread recently due to the services provided to users according to their need. Being a pay-for-what-you-use service, it provides a much-encapsulated set of services. Cloud computing acts as a main attraction for the business owners. Whether they are big or small, they can choose from the required services. Management of heavy flow data is very likely to be managed under this with the confidentiality and security of the data attached. Having all these features may attract everyone, but every technique always comes with some issues. The main aim of this survey chapter is to gain a better understanding of security issues that can occur in cloud computing.
IRJET, 2022
This paper aims to develop cloud-based data describing components that allow data encryption and encryption. users can use this cloud-based web application whenever they feel uncomfortable in their lives and try to ignore it. The purpose of this paper is to provide Data Security which will be uploaded by the owner in encrypted format and later converted to encrypted form. In this paper, we consider encryption with a file system in which multiple data providers such as hospitals and physicians are authorized by individual records to upload their data to a trusted public cloud. User data is sent in encrypted form to ensure data security, and each data provider also sends encrypted data references to enable queries to encrypted data. We are proposing an Algorithm so that with the help of this algorithm we can encrypt and decrypt data .The Algorithm we use in our project is the AES (Advanced Encryption Standard) Algorithm so that we can encrypt the data and it will be stored in cloud.
International Journal of Recent Technology and Engineering (IJRTE), 2019
The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed tha...
In recent the most of the companies are using the cloud to store their huge database. Cloud provides the large space for storage. Cloud is nothing but the pay-as-you-go is used as the economical aspect of privacy-preserving. Privacy for this data is provided by encryption of the data. But there are chances of attack so the violence of the data is possible. For data protection the anonymization and then encryption of data is held on. But whenever the user tries to re-access the data, it should be decrypted. At every time of accessing the encryption and the decryption of the data should be done, which increases the cost of the privacy-preservation also it is the time consuming process as the large number of keys used for encryption and decryption. To reduce this cost of privacy-preservation the privacy leakage constraint is used in which the problem is divided in subproblems and then finding the solution. Then the data is divided into the intermediate datasets. The threshold value is used to privacy-preservation which gives the low cost privacy-preservation. Here the privacy-preserving cost reducing heuristic algorithm is useful for the privacy leakage.
International Journal of Innovative Technology and Exploring Engineering, 2019
Cloud service is the most popular environment utilized by millions of users for different kind of service utilization. Cloud services needs to be provided with the concern of satisfying user requirements to increase their popularity level. The main issues associated with cloud service handling are maintaining integrity of data, user management, secured data transmission and so on. These issues are addressed by various authors by introducing the different methodologies. In this analysis work, discussion about those research techniques has been given with the detailed explanation. This paper provides the overview about the different research techniques whose main goal is to achieve the increase the data integrity level of the shared data. This paper also provides the discussion about various dynamic grouping techniques which tends to provide more flexible access to the user revocation. Different research techniques proposed by various authors has been described and compared their perf...
Dependable, Autonomic and …, 2009
In this paper we present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof facilities provides a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access. PasS central design goal is to maximize users' control in managing the various aspects related to the privacy of sensitive data. This is achieved by implementing user-configurable software protection and data privacy mechanisms. Moreover, PasS provides a privacy feedback process which informs users of the different privacy operations applied on their data and makes them aware of any potential risks that may jeopardize the confidentiality of their sensitive information. To the best of our knowledge, PasS is the first practical cloud computing privacy solution that utilizes previous research on cryptographic coprocessors to solve the problem of securely processing sensitive data in cloud computing infrastructures.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.