Skip to main content
Top

2021 | OriginalPaper | Chapter

Security Threats and Privacy Issues in Cloud Data

Authors : Sanjana C. Shekar, K. Sriram, N. Jayapandian

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The quick advancement of Web-based applications has led to a huge amount of information being scanned and gathered for business examination or scholarly research purposes, which may disregard individual protection. Organizations, industries and individuals data are at stake. In this paper, utilizing on the Web Personal Health Record (PHR) as contextual analysis, first demonstrate the need of inquiry ability approval that lessens the security introduction coming about because of the list items, and build up a versatile structure for authorized private keyword Search (APKS) over encoded cloud information. This particular model proposes two novel answers for APKS given on-going cryptographic crude, hierarchical predicate encryption (HPE). Our answers empower efficient multi-dimensional watchword looks with a run question, permit assignment and renouncement of hunt abilities. Additionally, the proposed system improves the question protection which conceals clients’ inquiry watchwords against the server. Actualize our plan on an advanced workstation, and exploratory outcomes exhibit its appropriateness for reasonable use. Privacy has seen advancement lately as information mining of the datasets in a dispersed huge information condition has turned into a successful worldwide business which is none other than data management or data analytics which ensures the security of data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bache F, Plump C, Güneysu T (2018) Confident leakage assessment—side-channel evaluation framework based on confidence intervals. In: Design, automation and test in Europe conference and exhibition (DATE). IEEE, pp 1117–1122 Bache F, Plump C, Güneysu T (2018) Confident leakage assessment—side-channel evaluation framework based on confidence intervals. In: Design, automation and test in Europe conference and exhibition (DATE). IEEE, pp 1117–1122
2.
go back to reference Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 383–392 Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 383–392
3.
go back to reference Oliveira ASD, Kerschbaum F, Lim HW, Yu SY (2012) Privacy-preserving techniques and system for streaming databases Oliveira ASD, Kerschbaum F, Lim HW, Yu SY (2012) Privacy-preserving techniques and system for streaming databases
4.
go back to reference Jayapandian N, Rahman AMZ, Radhikadevi S, Koushikaa M (2016) Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In: Futuristic trends in research and ınnovation for social welfare (Startup Conclave), World Conference on. IEEE, pp 1–4 Jayapandian N, Rahman AMZ, Radhikadevi S, Koushikaa M (2016) Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In: Futuristic trends in research and ınnovation for social welfare (Startup Conclave), World Conference on. IEEE, pp 1–4
5.
go back to reference Wang P, Ravishankar CV (2013) Secure and efficient range queries on outsourced databases using Rp-trees. In: Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, pp 314–325 Wang P, Ravishankar CV (2013) Secure and efficient range queries on outsourced databases using Rp-trees. In: Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, pp 314–325
6.
go back to reference Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef
7.
go back to reference Yao X, Zhou X, Ma J (2016) Differential privacy of big data: an overview. In: Big data security on cloud (BigDataSecurity), IEEE ınternational conference on high performance and smart computing (HPSC), and IEEE ınternational conference on ıntelligent data and security (IDS), 2016 ıeee 2nd ınternational conference on. IEEE, pp 7–12 Yao X, Zhou X, Ma J (2016) Differential privacy of big data: an overview. In: Big data security on cloud (BigDataSecurity), IEEE ınternational conference on high performance and smart computing (HPSC), and IEEE ınternational conference on ıntelligent data and security (IDS), 2016 ıeee 2nd ınternational conference on. IEEE, pp 7–12
8.
go back to reference Qiu H, Memmi G, Noura H (2017) An efficient secure storage scheme based on information fragmentation. In: 2017 IEEE 4th ınternational conference on cyber security and cloud computing (CSCloud). IEEE, pp 108–113 Qiu H, Memmi G, Noura H (2017) An efficient secure storage scheme based on information fragmentation. In: 2017 IEEE 4th ınternational conference on cyber security and cloud computing (CSCloud). IEEE, pp 108–113
9.
go back to reference Jayapandian N, Rahman AMZ, Koushikaa M, Radhikadevi S (2016) A novel approach to enhance multi level security system using encryption with fingerprint in cloud. In: Futuristic trends in research and ınnovation for social welfare (Startup Conclave), World Conference on. IEEE, pp 1–5 Jayapandian N, Rahman AMZ, Koushikaa M, Radhikadevi S (2016) A novel approach to enhance multi level security system using encryption with fingerprint in cloud. In: Futuristic trends in research and ınnovation for social welfare (Startup Conclave), World Conference on. IEEE, pp 1–5
10.
go back to reference Huang K, Xian M, Fu S, Liu J (2014) Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor. IET Commun 8(12):2106–2113CrossRef Huang K, Xian M, Fu S, Liu J (2014) Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor. IET Commun 8(12):2106–2113CrossRef
11.
go back to reference Jayapandian N (2019) Threats and security ıssues in smart city devices. In: Secure cyber-physical systems for smart cities. IGI Global, pp 220–250 Jayapandian N (2019) Threats and security ıssues in smart city devices. In: Secure cyber-physical systems for smart cities. IGI Global, pp 220–250
12.
go back to reference Reuter C (2019) Information technology for peace and security. Springer Reuter C (2019) Information technology for peace and security. Springer
13.
go back to reference Wu Y, Lin N, Song W, Shen Y, Yang X, Zhang J, Sun Y (2019) Adaptive authorization access method for medical cloud data based on attribute encryption. In: International conference on web ınformation systems and applications. Springer, Cham, pp 361–367 Wu Y, Lin N, Song W, Shen Y, Yang X, Zhang J, Sun Y (2019) Adaptive authorization access method for medical cloud data based on attribute encryption. In: International conference on web ınformation systems and applications. Springer, Cham, pp 361–367
14.
go back to reference Taylor ME, Aboagye-Darko D Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security. In: International conference on artificial ıntelligence and security. Springer, Cham, pp 516–524 Taylor ME, Aboagye-Darko D Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security. In: International conference on artificial ıntelligence and security. Springer, Cham, pp 516–524
15.
go back to reference Lee HT, Ling S, Seo JH, Wang H, Youn TY (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108MathSciNetCrossRef Lee HT, Ling S, Seo JH, Wang H, Youn TY (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108MathSciNetCrossRef
Metadata
Title
Security Threats and Privacy Issues in Cloud Data
Authors
Sanjana C. Shekar
K. Sriram
N. Jayapandian
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_24