CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Survey on Privacy-Preserving Methods for Storage in Cloud Computing

Published on January 2013 by Neethu Mariam Joseph, Esther Daniel, N. A. Vasanthi
Amrita International Conference of Women in Computing - 2013
Foundation of Computer Science USA
AICWIC - Number 4
January 2013
Authors: Neethu Mariam Joseph, Esther Daniel, N. A. Vasanthi
99582bb1-b099-4911-8967-299f2eea7be7

Neethu Mariam Joseph, Esther Daniel, N. A. Vasanthi . Survey on Privacy-Preserving Methods for Storage in Cloud Computing. Amrita International Conference of Women in Computing - 2013. AICWIC, 4 (January 2013), 1-4.

@article{
author = { Neethu Mariam Joseph, Esther Daniel, N. A. Vasanthi },
title = { Survey on Privacy-Preserving Methods for Storage in Cloud Computing },
journal = { Amrita International Conference of Women in Computing - 2013 },
issue_date = { January 2013 },
volume = { AICWIC },
number = { 4 },
month = { January },
year = { 2013 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/aicwic/number4/9880-1322/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Amrita International Conference of Women in Computing - 2013
%A Neethu Mariam Joseph
%A Esther Daniel
%A N. A. Vasanthi
%T Survey on Privacy-Preserving Methods for Storage in Cloud Computing
%J Amrita International Conference of Women in Computing - 2013
%@ 0975-8887
%V AICWIC
%N 4
%P 1-4
%D 2013
%I International Journal of Computer Applications
Abstract

At present the mankind are progressively relying more on a number of online storage stores to back up our data or for using it in real time which gives an anywhere, anytime access. All these services bring with it, concerns of security and privacy weaknesses for all the services provided by them since the user's data are stored and maintained out of user's premises. This paper portrays the various issues associated to privacy while storing the user's data on third party service providers, which is more commonly termed as cloud service. Cloud computing refers to the fundamental infrastructure for an up-coming model of service provision that has the benefit of dropping cost by sharing computing and storage resources, united with an on-demand provisioning mechanism depending on a pay-per-use business model. Without appropriate security and privacy solutions designed for clouds this computing paradigm could become a huge failure. There is a lot of research being made to spot out the issues with these cloud service providers and cloud security in general. This paper is on regard of one of the key issue -privacy that occur in the context of cloud computing and analyze the various works being done to solve the issues in privacy and thus to ensure privacy to outsourced data on cloud storage.

References
  1. Huth, A. , & Cebula, J. 2011. The Basics of Cloud Computing. United States Computer Emergency Readiness Team.
  2. Pearson, S. 2012. Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computing, 3-42.
  3. Mohammed, A. , AlSudiari, T. , & Vasista, T. G. K. 2012. Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications. Advanced Computing: An International Journal (ACIJ), 3 (2), 159-169. . .
  4. Ateniese, G. , Burns, R. , Curtmola, R. , Herring, J. , Kissner, L. , Peterson, Z. , & Song, D. 2007, October. Provable data possession at untrusted stores. InProceedings of the 14th ACM conference on Computer and communications security (pp. 598-609). ACM.
  5. Juels, A. , & Kaliski Jr, B. S. 2007, October. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584-597). ACM. .
  6. Huang, R. , Yu, S. , Zhuang, W. , & Gui, X. 2010. Design of privacy-preserving cloud storage framework. In Grid and Cooperative Computing (GCC), 2010 9th International Conference on (pp. 128-132). IEEE
  7. Huang, Z. , Li, Q. , Zheng, D. , Chen, K. , & Li, X. 2011, December. YI Cloud: Improving user privacy with secret key recovery in cloud storage. In Service Oriented System Engineering (SOSE), 2011 IEEE 6th International Symposium on (pp. 268-272). IEEE.
  8. Huang, R. , Gui, X. , Yu, S. , & Zhuang, W. 2011. Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. In Network Computing and Information Security (NCIS), 2011 International Conference on(Vol. 1, pp. 93-97). IEEE.
  9. Fan, C. I. , & Huang, S. Y. 2012. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems.
  10. Jayalatchumy, D. , Ramkumar, P. , & Kadhirvelu, D. 2010, November. Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm. In Emerging Trends in Engineering and Technology (ICETET), pp. 456-461
  11. Ruj, S. , Stojmenovic, M. , & Nayak, A. 2012, May. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In Cluster, Cloud and Grid Computing (CCGrid),12th IEEE/ACM International Symposium on(pp. 556-563). IEEE.
  12. Liu, Q. , Wang, G. , & Wu, J. 2009, August. An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 2, pp. 715-720). IEEE.
  13. Sayi, T. J. V. R. K. , Krishna, R. S. , Mukkamala, R. , & Baruah, P. K. 2012. Data Outsourcing in Cloud Environments: A Privacy Preserving Approach. In Information Technology: New Generations (ITNG), 2012 Ninth International Conference on (pp. 361-366).
  14. Shah, M. A. , Baker, M. , Mogul, J. C. , & Swaminathan, R. 2007, May. Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on Hot topics in operating systems (pp. 1-6). USENIX Association.
  15. Yang, K. , & Jia, X. 2012. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4), 409-428.
  16. Chen, L. , & Guo, G. 2011. An efficient remote data possession checking in cloud storage. International Journal of Digital Content Technology and its Applications, 5(4), 43-50.
  17. Gohel, M. , & Gohil, B. 2012. A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage. Trust Management VI, 240-246.
  18. Wang, Q. , Wang, C. , Ren, K. , Lou, W. , & Li, J. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Trans. on, 22(5), 847-859.
  19. Ateniese, G. , Burns, R. , Curtmola, R. , Herring, J. , Khan, O. , Kissner, L. , . . . & Song, D. 2011. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.
  20. Hao, Z. , Zhong, S. , & Yu, N. 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. Knowledge and Data Engineering, IEEE Transactions on, 23(9), 1432-1437.
  21. Wang, C. , Chow, S. , Wang, Q. , Ren, K. , & Lou, W. 2010. Privacy-preserving public auditing for secure cloud storage.
  22. Zhu, Y. , Hu, H. , Ahn, G. J. , & Yau, S. S. 2011. Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Storage Privacy Privacy-preserving