SECURITY OF DATA AND PROCESSING IN CLOUD COMPUTING

Shipra Yadav, Keshao Kalaskar

Abstract


Cloud computing is attracting huge attention from both the academic and commercial fields thanks to its provision of vast amounts of shared computing resources for Internet users. However, moving private or sensitive data and their related processing into clouds while offering data owners no physical and only limited digital control raises serious concerns about data security. Thus, this research work aims to develop a new cryptographic framework to secure data and related processing in the cloud so as to enable users to enjoy the tremendous benefits of cloud computing while ensuring their data remains protected.


Keywords


Component; Cloud Computing; Homomorphic; Encryption; Field Homomorphism

Full Text:

PDF

References


S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 - 11, 2011.

P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, U. S. Department of Commerce, 2011.

Z. Mahmood, “Data Location and Security Issues in Cloud Computing,”

2011 International Conference on Emerging Intelligent Data and Web Technologies, pp. 49-54, 2011.

S. Sengupta, V. Kaulgud and V. S. Sharma, “Cloud Computing Security - Trends and Research Directions,” IEEE World Congress on Services, pp. 524 - 531, 2011.

S. S. Yau and H. G. An, “Anonymous Service Usage and Payment in Service-based Systems,” 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 714-720, 2011.

You-Jin, K.-Y. Park and J.-M. S. Kang, “The method of protecting privacy capable of distributing and storing of data efficiently for cloud computing environment,” 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), pp. 258-262, 2011.

F. Rocha and M. Correia, “Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud,” 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, pp. 129-134, 2011.

Y. Shen, W. Cui, Q. Li and Y. Shi, “Hybrid Fragmentation to Preserve Data Privacy for SaaS,” 2011 Eighth Web Information Systems and Applications Conference (WISA), pp. 3 - 6, 2011.

C. Wang, Q. Wang, K. Ren and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” IWQoS. 17th International Workshop on Quality of Service, pp. 1-9, 2009.

C. Delettre, K. Boudaoud and M. Riveill, “Cloud Computing, Security and Data Concealment,” 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 424-431, 2011.

S. Bajaj and R. Sion, “TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality,” SIGMOD '11: Proceedings of the 2011 international conference on Management of data , pp. 205-216, 2011.

C.-F. Chan, “Symmetric-Key Homomorphic Encryption for Encrypted Data Processing,” ICC '09. IEEE International Conference on Communications, pp. 1-5, 2009.

Gentry, “Computing Arbitrary Functions of Encrypted Data,” Communications of the ACM , vol. 53, no. 3, pp. 97-105, 2010.

Q. Liu, GuojunWang and JieWub, “Secure and privacy preserving keyword searching for cloud storage services,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 927-933, 2012.

M. Yoshino, K. Naganuma and H. Satoh, “Symmetric Searchable Encryption for Database Applications,” 2011 14th International Conference on Network-Based Information Systems (NBiS), pp. 657-662, 2011.

M. Chuah and W. Hu, “Privacy-aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data,” 2011 31st International Conference on Distributed Computing Systems Workshops, pp. 273-281, 2011.

C. Liu, L. Zhu, L. Li and Y. Tan, “Fuzzy keyword search on encrypted cloud storage data with small index,” 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 269-273, 2011.

H.-A. Park, J. H. Park and D. H. Lee, “PKIS: practical keyword index search on cloud datacenter,” EURASIP Journal on Wireless Communications and Networking, pp. 1-16, 2011.

Y. Yang, “Towards Multi-User Private Keyword Search for Cloud Computing,” 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 758-759, 2011.

Sahai, “Computing on Encrypted Data,” Springer-Verlag Berlin Heidelberg, pp. 148 - 153, 2008.


Refbacks

  • There are currently no refbacks.