Paper Title : A PROFICIENT PRIVACY PROTECTION METHOD FOR CLOUD COMPUTING
ISSN : 2394-2231
Year of Publication : 2022
10.5281/zenodo.6463352
MLA Style: A PROFICIENT PRIVACY PROTECTION METHOD FOR CLOUD COMPUTING "Ms. N. Zahira Jahan, M.C.A., M.Phil., Mr. S. Vijay" Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: A PROFICIENT PRIVACY PROTECTION METHOD FOR CLOUD COMPUTING "Ms. N. Zahira Jahan, M.C.A., M.Phil., Mr. S. Vijay" Volume 9 - Issue 2 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
With the rapid development of Cloud computing, further Cloud services are into our daily life, and therefore security protection of Cloud services, especially data privacy protection, becomes more important. Still to perform privacy protection causes huge outflow. Therefore it's a critical issue to perform the most suitable protection to decline performance consumption while give privacy protection. In this design, the Complete Sequestration Protection Scheme (CSPS) is proposed to give the applicable privacy protection which is satisfying the stoner- demand privacy demand and maintaining system performance contemporaneously. At first, the privacy position is anatomized by druggies those bear and quantify security degree and performance of 3DES and AES encryption algorithms. Also, an applicable security composition is deduced by the results of analysis and quantified data. Eventually, the simulation results show that the CSPS not only fulfills the stoner- demand privacy but also maintains the Cloud system performance in different Cloud surroundings
Reference
[1] J. Domingo-Ferrer, O. Farràs, J. Ribes-González, and D. Sánchez, ‘‘Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges,’’ Comput. Commun., vols. 140–141, pp. 38– 60, May 2019. [2] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, ‘‘A survey on IoT security: Application areas, security threats, and solution architectures,’’ IEEE Access, vol. 7, pp. 82721–82743, 2019. [3] H. Deng, Z. Qin, Q. Wu, Z. Guan, R. H. Deng, Y. Wang, and Y. Zhou, ‘‘Identity-based encryption transformation for flexible sharing of encrypted data in public cloud,’’ IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3168–3180, 2020. [4] Eurostat, Cloud computing - statistics on the use by enterprises (Dec. 2016 (Accessed 14 February 2019)). URL http://ec.europa.eu/eurostat/statistics-explained/index.php/ Cloud_computing_-_statistics_on_the_use_by_enterprises [5] C. S. Alliance, Cloud usage: Risks and opportunities report (Sep. 2014 (Accessed 14 February 2019)). URL https://downloads.cloudsecurityalliance.org/initiatives/colla borate/netskope/Cloud_Usage_Risks_and_Opportunities_S urvey_Report.pdf [6] T. Haeberlen, L. Dupr ́e, Cloud computing. benefits, risks and recommendations for information security (rev. b), European Network and Information Security Agency (Dec. 2012). [7] A. Westin, Privacy and Freedom, Atheneum, 1967. [8] E. Ramirez, J. Brill, M. K. Ohlhausen, J. D. Wright, T. McSweeny, Data brokers: A call for transparency and accountability, U.S. Federal Trade Commission (May 2014). [9] M. A. Khan, A survey of security issues for cloud computing, Journal of Network and Computer Applications 71 (2016) 11–29. [10] S. Singh, Y.-S. Jeong, J. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications 75 (2016) 200– 222. [11] A. Singh, K. Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications 79 (2017) 88–115. [12] P. Praveen-Kumar, P. Syam-Kumar, P. Alphonse, Attribute based encryption in cloud computing: A survey, gap analysis, and future directions, Journal of Network and Computer Applications 108 (2018) 37–52. [13] N. Kaaniche, M. Laurent, Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms, Computer Communications 111 (2017) 120–141. [14] J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Buyya, Ensuring security and privacy preservation for cloud data services, ACM Computing Surveys 49 (1) (2016) Article No. 13. [15] Z. Shan, K. Ren, M. Blanton, C. Wang, Practical secure computation outsourcing: A survey, ACM Computing Surveys 51 (2) (2018) Article No. 31.
Keywords
— Cloud Computing, Cryptography, Symmetric Encryption, Third Party Auditing.