Skip to main content

2024 | OriginalPaper | Buchkapitel

A Review on Privacy Preservation in Cloud Computing and Recent Trends

verfasst von : Srutipragyan Swain, Prasant Kumar Pattnaik, Banchhanidhi Dash

Erschienen in: Micro-Electronics and Telecommunication Engineering

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a distributed computing architectural model that offers on-demand computing services via the Internet. It includes servers, computing resources, applications, data storage, development tools, etc. However, despite the different services and benefits offered by the cloud, security and privacy are the primary hindrances for organizations for opting cloud. The real benefit of the cloud can be only enjoyed if the sensitive data kept in the database can be secured from unauthorized access. Privacy preservation in cloud computing is nothing but hiding sensitive data, where the data is stored in the software and databases scattered around the Internet. Various methods have been put forward by researchers to preserve privacy in cloud computing over the past few years.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Knorr E, Gruman G (2008) What cloud computing really means. InfoWorld 7(20–20):1–17 Knorr E, Gruman G (2008) What cloud computing really means. InfoWorld 7(20–20):1–17
2.
Zurück zum Zitat Le DN, Pal S, Pattnaik PK (2022) Auditing concept in cloud computing. In: Cloud computing solutions: architecture, data storage, implementation and security, pp 165–180 Le DN, Pal S, Pattnaik PK (2022) Auditing concept in cloud computing. In: Cloud computing solutions: architecture, data storage, implementation and security, pp 165–180
3.
Zurück zum Zitat Ali M, Miraz MH (2013) Cloud computing applications. In Proceedings of the International Conference on Cloud Computing and eGovernance, vol 1 Ali M, Miraz MH (2013) Cloud computing applications. In Proceedings of the International Conference on Cloud Computing and eGovernance, vol 1
4.
Zurück zum Zitat Zhang X, Liu C, Nepal S, Pandey S, Chen J (2012) A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202CrossRef Zhang X, Liu C, Nepal S, Pandey S, Chen J (2012) A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202CrossRef
5.
Zurück zum Zitat Lin HY, Tzeng WG (2011) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003 Lin HY, Tzeng WG (2011) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003
6.
Zurück zum Zitat Fung BC, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surveys (Csur) 42(4):1–53CrossRef Fung BC, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surveys (Csur) 42(4):1–53CrossRef
7.
Zurück zum Zitat Andoni A, Indyk P (2008) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun ACM 51(1):117–122CrossRef Andoni A, Indyk P (2008) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun ACM 51(1):117–122CrossRef
8.
Zurück zum Zitat Lee KH, Lee YJ, Choi H, Chung YD, Moon B (2012) Parallel data processing with MapReduce: a survey. AcMsIGMoD Record 40(4):11–20CrossRef Lee KH, Lee YJ, Choi H, Chung YD, Moon B (2012) Parallel data processing with MapReduce: a survey. AcMsIGMoD Record 40(4):11–20CrossRef
9.
Zurück zum Zitat Fung BC, Wang K, Philip SY (2007) Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng 19(5):711–725CrossRef Fung BC, Wang K, Philip SY (2007) Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng 19(5):711–725CrossRef
10.
Zurück zum Zitat Samarati P, Di Vimercati SDC (2010) Data protection in outsourcing scenarios: Issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp 1–14, April Samarati P, Di Vimercati SDC (2010) Data protection in outsourcing scenarios: Issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp 1–14, April
11.
Zurück zum Zitat Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRef Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570MathSciNetCrossRef
12.
Zurück zum Zitat Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2011) Publishing search logs—a comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532CrossRef Gotz M, Machanavajjhala A, Wang G, Xiao X, Gehrke J (2011) Publishing search logs—a comparative study of privacy guarantees. IEEE Trans Knowl Data Eng 24(3):520–532CrossRef
13.
Zurück zum Zitat Zhang Q, Koudas N, Srivastava D, Yu T (2007) Aggregate query answering on anonymized tables. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 116–125, April Zhang Q, Koudas N, Srivastava D, Yu T (2007) Aggregate query answering on anonymized tables. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 116–125, April
14.
Zurück zum Zitat LeFevre K, DeWitt DJ, Ramakrishnan R (2008) Workload-aware anonymization techniques for large-scale datasets. ACM Trans Database Syst (TODS) 33(3):1–47CrossRef LeFevre K, DeWitt DJ, Ramakrishnan R (2008) Workload-aware anonymization techniques for large-scale datasets. ACM Trans Database Syst (TODS) 33(3):1–47CrossRef
15.
Zurück zum Zitat Li J, Tao Y, Xiao X (2008) Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp 473–486, June Li J, Tao Y, Xiao X (2008) Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp 473–486, June
16.
Zurück zum Zitat Li N, Li T, Venkatasubramanian S (2006) t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 106–115, April. Li N, Li T, Venkatasubramanian S (2006) t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 106–115, April.
17.
Zurück zum Zitat Wang T, Meng S, Bamba B, Liu L, Pu C (2009) A general proximity privacy principle. In: 2009 IEEE 25th International Conference on Data Engineering. IEEE, pp 1279–1282, March Wang T, Meng S, Bamba B, Liu L, Pu C (2009) A general proximity privacy principle. In: 2009 IEEE 25th International Conference on Data Engineering. IEEE, pp 1279–1282, March
18.
Zurück zum Zitat Osman H, Siraj MM, Maarof MA (2021) HAC: model for privacy-preserving outsourced data over cloud. In: 2021 3rd International Cyber Resilience Conference (CRC). IEEE, pp 1–4, January Osman H, Siraj MM, Maarof MA (2021) HAC: model for privacy-preserving outsourced data over cloud. In: 2021 3rd International Cyber Resilience Conference (CRC). IEEE, pp 1–4, January
19.
Zurück zum Zitat Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index-based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRef Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index-based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542–555MathSciNetCrossRef
20.
Zurück zum Zitat Wang J, Zhao Y, Jiang S, Le J (2010) Providing privacy preserving in cloud computing. In: 3rd International Conference on Human System Interaction. IEEE, pp 472–475, May Wang J, Zhao Y, Jiang S, Le J (2010) Providing privacy preserving in cloud computing. In: 3rd International Conference on Human System Interaction. IEEE, pp 472–475, May
21.
Zurück zum Zitat Agarkhed J, Ashalatha R (2017) A privacy preservation scheme in cloud environment. In: 2017 third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB). IEEE, pp 549–552, February Agarkhed J, Ashalatha R (2017) A privacy preservation scheme in cloud environment. In: 2017 third international conference on advances in electrical, electronics, information, communication and bio-informatics (AEEICB). IEEE, pp 549–552, February
22.
Zurück zum Zitat Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P (2010) Encryption policies for regulating access to outsourced data. ACM Trans Database Syst (TODS) 35(2):1–46CrossRef Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P (2010) Encryption policies for regulating access to outsourced data. ACM Trans Database Syst (TODS) 35(2):1–46CrossRef
23.
Zurück zum Zitat Raykova M, Zhao H, Bellovin SM (2012) Privacy enhanced access control for outsourced data sharing. In International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp 223–238, February Raykova M, Zhao H, Bellovin SM (2012) Privacy enhanced access control for outsourced data sharing. In International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp 223–238, February
24.
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 457–473, May Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 457–473, May
25.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98, October Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89–98, October
26.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334, May Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321–334, May
27.
Zurück zum Zitat Sohrabi MK, Ghods V, Mohammadian N (2017) Privacy of cloud data using a secure SSO architecture. In: 2017 Computing Conference. IEEE, pp 224–229, July Sohrabi MK, Ghods V, Mohammadian N (2017) Privacy of cloud data using a secure SSO architecture. In: 2017 Computing Conference. IEEE, pp 224–229, July
28.
Zurück zum Zitat Ladole AR, Chhajed KK, Shelke FM (2018) A survey on privacy preserving techniques in cloud environments. In: 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). IEEE, pp 1–5, March Ladole AR, Chhajed KK, Shelke FM (2018) A survey on privacy preserving techniques in cloud environments. In: 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT). IEEE, pp 1–5, March
Metadaten
Titel
A Review on Privacy Preservation in Cloud Computing and Recent Trends
verfasst von
Srutipragyan Swain
Prasant Kumar Pattnaik
Banchhanidhi Dash
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9562-2_30

Neuer Inhalt