Abstract
Cloud computing is one of the revolutionary technology for individual users due to its availability of on-demand services through the sharing of resources. This technology avoids the in-house infrastructure construction, cost of infrastructure and its maintenance. Hence individual users and organizations are moving towards cloud to outsource their data and applications. But many individuals are worried about the privacy and confidentiality of their data before sharing into cloud. The Cloud service provider has to ensure data security against unauthorized access in and out of the cloud computing infrastructure. Hence this paper identifies and describes the possible threats on Data confidentiality and privacy. The author also presents the anatomy and summary of general observations made on the available mechanisms to counter these threats.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al-Jaberi, M.F., Zainal, A.: Data integrity and privacy model in cloud computing. In: 2014 International Symposium on, Biometrics and Security Technologies (ISBAST), pp. 280–284. IEEE (2014)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Asiacrypt, vol. 2894, pp. 452–473. Springer (2003)
Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: Sedasc: secure data sharing in clouds. IEEE Syst. J. (2015)
Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security. In: 2014 International Conference on, Computer Communication and Informatics (ICCCI), pp. 1–5. IEEE (2014)
Babitha, M., Babu, K.R.: Secure cloud storage using aes encryption. In: International Conference on, Automatic Control and Dynamic Optimization Techniques (ICACDOT), pp. 859–864. IEEE (2016)
Balasaraswathi, V., Manikandan, S.: Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In: 2014 International Conference on, Advanced Communication Control and Computing Technologies (ICACCCT), pp. 1190–1194. IEEE (2014)
Bensitel, Y., Romadi, R.: Secure data storage in the cloud with homomorphic encryption. In: 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), pp. 1–6. IEEE (2016)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Go, W., Kwak, J.: Dual server-based secure data-storage system for cloud storage. Int. J. Eng. Syst. Model. Simul. 1 6(1–2), 86–90 (2014)
Iliana, I., Daneva, M.: Cloud computing security requirements: a systematic review. In: 2012 Sixth International Conference on, Research Challenges in Information Science (RCIS), IEEE
Kumar, N.S., Lakshmi, G.R., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015)
Liu, H., Ning, H., Xiong, Q., Yang, L.T.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26(1), 241–251 (2015)
Marimuthu, K., Gopal, D.G., Kanth, K.S., Setty, S., Tainwala, K.: Scalable and secure data sharing for dynamic groups in cloud. In: 2014 International Conference on, Advanced Communication Control and Computing Technologies (ICACCCT), pp. 1697–1701. IEEE (2014)
Moghaddam, F.F., Yezdanpanah, M., Khodadadi, T., Ahmadi, M., Eslami, M.: VDCI: Variable data classification index to ensure data protection in cloud computing environments. In: 2014 IEEE Conference on Systems, Process and Control (ICSPC), pp. 53–57. IEEE (2014)
Nimje, A.R., Gaikwad, V., Datir, H.: Attribute-based encryption techniques in cloud computing security: an overview. Int. J. Comput. Trends Technol. (2013)
Prasad, K., Poonam, J., Gauri, K., Thoutam, N.: Data sharing security and privacy preservation in cloud computing. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1070–1075. IEEE (2015)
Saroj, S.K., Chauhan, S.K., Sharma, A.K., Vats, S.: Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 202–207. IEEE (2015)
Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)
Sirohi, P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 115–118. IEEE (2015)
Tseng, Y.M., Tsai, T.T., Huang, S.S., Huang, C.P.: Identity-based encryption with cloud revocation authority and its applications. IEEE Trans. Cloud Comput. (2016)
Wei, J., Liu, W., Hu, X.: Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Trans. Cloud Comput. (2016)
Wikipedia, f.e.: Homomorphic encryption. https://en.wikipedia.org/wiki/Homomorphic_encryption
Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012)
Zhou, S., Du, R., Chen, J., Deng, H., Shen, J., Zhang, H.: SSEM: Secure, scalable and efficient multi-owner data sharing in clouds. China Commun. 13(8), 231–243 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kodada, B.B., D’Mello, D.A. (2018). DCaP—Data Confidentiality and Privacy in Cloud Computing: Strategies and Challenges. In: Reddy Edla, D., Lingras, P., Venkatanareshbabu K. (eds) Advances in Machine Learning and Data Science. Advances in Intelligent Systems and Computing, vol 705. Springer, Singapore. https://doi.org/10.1007/978-981-10-8569-7_24
Download citation
DOI: https://doi.org/10.1007/978-981-10-8569-7_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8568-0
Online ISBN: 978-981-10-8569-7
eBook Packages: EngineeringEngineering (R0)