Skip to main content
Top

2016 | OriginalPaper | Chapter

Review of Security and Privacy Techniques in Cloud Computing Environment

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud is an ironic solution of the ultimate globalization which is a bunch of dedicated servers, networking elements such as software and hardware networked with the internet. Cloud computing enables the user to utilize the applications, storage solutions, and resources, likewise it also authorizes the data access, data management, and connectivity. All the activities of the cloud infrastructure seem to be transparent to ensure it without any notion of the locale to its user. The rising technology aids to deliver on-demand web access speedily to the computing resources. Cloud user can access and release the computing resources with minimum management effort and least interaction with cloud service provider. A consolidated cloud service i.e., hybrid cloud renders a federation, bridge, secure encrypted connection, information placement decision between the public and private cloud and utilizes the services of the two clouds those are security, availability, and cost effectiveness. Though cloud computing services have bags of inherent benefits, there are likelihood risks in privacy and security heeding’s that should be thought over before collecting, processing, sharing or storing enterprise or individual’s data in the cloud. This survey paper explores the contemporary techniques and methods to furnish a trustworthy and foolproof cloud computing environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Trans. IEEE Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Trans. IEEE Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
2.
go back to reference Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefMATH Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefMATH
3.
go back to reference Ghogare, S., Pawar, A., Dani, A.: Revamping optimal cloud storage system. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 457–463. Springer India (2016) Ghogare, S., Pawar, A., Dani, A.: Revamping optimal cloud storage system. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 457–463. Springer India (2016)
4.
go back to reference Pawar, A.V., Dani, A.A.: Design of privacy model for storing files on cloud storage. J. Theor. Appl. Inf. Technol. 67(2), (2014) Pawar, A.V., Dani, A.A.: Design of privacy model for storing files on cloud storage. J. Theor. Appl. Inf. Technol. 67(2), (2014)
5.
go back to reference Yao, X.: Anonymous credential-based access control scheme for clouds. Cloud Comput. IEEE J. Mag. 2, pp. 34–43, (2015) Yao, X.: Anonymous credential-based access control scheme for clouds. Cloud Comput. IEEE J. Mag. 2, pp. 34–43, (2015)
6.
go back to reference Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. Netw. IEEE 24(4), 19–24 (2010)CrossRef Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. Netw. IEEE 24(4), 19–24 (2010)CrossRef
8.
go back to reference Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)CrossRef Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)CrossRef
9.
go back to reference Ningning, S., Zhiguo, S., Yan, S., Xianwei, Z.: Multi-matrix combined public key based on big data system key management scheme (2014) Ningning, S., Zhiguo, S., Yan, S., Xianwei, Z.: Multi-matrix combined public key based on big data system key management scheme (2014)
10.
go back to reference Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467–479 (2014)CrossRef Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467–479 (2014)CrossRef
11.
go back to reference Zhang, H., Jiang, G., Yoshihira, K., Chen, H.: Proactive workload management in hybrid cloud computing. IEEE Trans. Netw. Serv. Manage. 11(1), 90–100 (2014)CrossRef Zhang, H., Jiang, G., Yoshihira, K., Chen, H.: Proactive workload management in hybrid cloud computing. IEEE Trans. Netw. Serv. Manage. 11(1), 90–100 (2014)CrossRef
12.
go back to reference Lu, P., Sun, Q., Wu, K., Zhu, Z.: Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Trans. Multimedia, 17, 1297–1308 (2015) Lu, P., Sun, Q., Wu, K., Zhu, Z.: Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Trans. Multimedia, 17, 1297–1308 (2015)
13.
go back to reference Jiang, D., Tung, A.K., Chen, G.: Map-join-reduce: toward scalable and efficient data analysis on large clusters. IEEE Transactions Knowl. Data Eng. 23(9), 1299–1311 (2011)CrossRef Jiang, D., Tung, A.K., Chen, G.: Map-join-reduce: toward scalable and efficient data analysis on large clusters. IEEE Transactions Knowl. Data Eng. 23(9), 1299–1311 (2011)CrossRef
14.
go back to reference Dahiphale, D., Karve, R., Vasilakos, A.V., Liu, H., Yu, Z., Chhajer, A., Wang, C.: An advanced mapreduce: cloud mapreduce, enhancements and applications. IEEE Trans. Netw. Serv. Manage. 1, 101–115 (2014)CrossRef Dahiphale, D., Karve, R., Vasilakos, A.V., Liu, H., Yu, Z., Chhajer, A., Wang, C.: An advanced mapreduce: cloud mapreduce, enhancements and applications. IEEE Trans. Netw. Serv. Manage. 1, 101–115 (2014)CrossRef
15.
go back to reference Ouedraogo, M., Mignon, S., Cholez, H., Furnell, S., Dubois, E.: Security transparency: the next frontier for security research in the cloud. J. Cloud Comput. 4(1), 1–14 (2015)CrossRef Ouedraogo, M., Mignon, S., Cholez, H., Furnell, S., Dubois, E.: Security transparency: the next frontier for security research in the cloud. J. Cloud Comput. 4(1), 1–14 (2015)CrossRef
16.
go back to reference Salam, M.I., Yau, W.C., Chin, J.J., Heng, S.H., Ling, H.C., Phan, R.C., Yap, W.S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(1), 1–16 (2015)CrossRef Salam, M.I., Yau, W.C., Chin, J.J., Heng, S.H., Ling, H.C., Phan, R.C., Yap, W.S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(1), 1–16 (2015)CrossRef
17.
go back to reference Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. 2(1), 1–14 (2013)CrossRef Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. 2(1), 1–14 (2013)CrossRef
18.
go back to reference Liu, X., Wang, X., Matwin, S., Japkowicz, N.: Meta-MapReduce for scalable data mining. J. Big Data 2(1), 1–21 (2015)CrossRef Liu, X., Wang, X., Matwin, S., Japkowicz, N.: Meta-MapReduce for scalable data mining. J. Big Data 2(1), 1–21 (2015)CrossRef
19.
go back to reference Senk, C.: Adoption of security as a service. J. Internet Serv. Appl. 4(1), 1–16 (2013)CrossRef Senk, C.: Adoption of security as a service. J. Internet Serv. Appl. 4(1), 1–16 (2013)CrossRef
20.
go back to reference Kaviani, N., Wohlstadter, E., Lea, R.: Partitioning of web applications for hybrid cloud deployment. J. Internet Serv. Appl. 5(1), 1–17 (2014)CrossRef Kaviani, N., Wohlstadter, E., Lea, R.: Partitioning of web applications for hybrid cloud deployment. J. Internet Serv. Appl. 5(1), 1–17 (2014)CrossRef
Metadata
Title
Review of Security and Privacy Techniques in Cloud Computing Environment
Authors
Rutuja Mote
Ambika Pawar
Ajay Dani
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-30933-0_54

Premium Partner