Abstract
Last few years the latest trend of computing has been cloud computing. Cloud has brought remarkable advancement in individual as well as IT sector. But still many organisations are lagging behind in using cloud services. Major issue that affect them is related to data protection at cloud and afraid of sensitive data leakage by intruders. To solve this problem a data protection model has been designed so that data owner feels free to use cloud services. Proposed model is highly secure and data is under control of data owner itself. Re-encryption, HMAC and Identity based user authentication techniques are used in this model to make it more effective and attractive to use this model in real world.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hwang, J.-J., Chuang, H.-K., Hsu, Y.-C., Wu, C.-H.: A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, National Science Council of Taiwan Government
Fan, C.-I., Huang, S.-Y.: Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE (2011)
Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)
Mohamed, E.M., EI-Etriby, S.: Randomness Testing of Modem Encryption Techniques in Cloud Environment. In: 8th International Conference on Informatics and Systems (2012)
Xu, Z., Martin, K.M.: Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)
Huang, K.-Y., Luo, G.-H., Yuan, S.-M.: SSTreasury+: A Secure and Elastic Cloud Data Encryption System. In: International Conference on Genetic and Evolutionary Computing. IEEE (2012)
Sur, C., Park, Y., Shin, S.U., Seo, C., Rhee, K.H.: Certificate-Based Proxy Re-Encryption for Public Cloud Storage. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE (2013)
Zhu, S., Yang, X., Wu, X.: Secure Cloud File System with Attribute based Encryption. In: International Conference on Intelligent Networking and Collaborative Systems. IEEE (2013)
Mowbray, M., Pearson, S.: Protecting Personal Information in Cloud Computing. Springer-Verlag (2012)
Liu, J., Wan, Z., Gu, M.: Hierarchical Attribute-Set Based Encryption for Scalable. In: Flexible and Fine-Grained Access Control in Cloud Computing. Springer-Verlag (2011)
Sood, S.K.: A Highly Secure Hybrid Security model for Data Security at Cloud. Submitted to Security and Communication Networks. John Wiley and Sons, Interscience (2012); Special Issue on Trust and Security in Cloud Computing
Sood, S.K.: A Combined Approach to Ensure Data Security in Cloud Computing. Submitted to Journal of Network and Computer Applications (2012)
Buyya, R., Vecchiola, C., Selvi, S.T.: Mastering Cloud Computing Foundations and Applications Programming. Morgan Kaufmann, USA
Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm. Springer Science+Business Media (2011)
Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajara, M.: A survey on security issues and solutions at different layers of Cloud computing. Springer (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Dhawan, K., Sharma, M. (2015). Data Owner Centric Approach to Ensure Data Protection in Cloud Environment. In: Buyya, R., Thampi, S. (eds) Intelligent Distributed Computing. Advances in Intelligent Systems and Computing, vol 321. Springer, Cham. https://doi.org/10.1007/978-3-319-11227-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-11227-5_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11226-8
Online ISBN: 978-3-319-11227-5
eBook Packages: EngineeringEngineering (R0)