Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Techniques for Data Privacy Preserving in Cloud Computing Environments
Shruthi M,, Demian Antony D’Mello
Department of Computer Science and Engineering N.M.A.M. Institute of Technology Visvesvaraya Technological University Belagavi, Nitte, India - 574110, Department of Computer Science and Engineering Canara Engineering College, Visvesvaraya Technological U
Abstract: Cloud Computing renders useful services over the Internet by increasing resource utilization and computational services at a decreased cost along different sectors. Data owners outsource their private data on cloud environment leading to loss of physical control over data. Security solutions provided in the literature to safeguard the data mainly focus on authentication and authorization. Data privacy preservation is one of the key areas in providing data security to ensure privacy guarantees for sensitive data namely health records, financial data, personal identities by providing strong end-to-end privacy. In this paper, the authors classify challenges in data privacy preservation based on the nature of mechanisms and type of data stored in cloud environments. The paper presents a detailed analysis of the literature in terms of methodologies adopted, algorithms proposed and cloud security performance metrics.
Keywords: Cloud Computing, Data Privacy Preserving, Security Techniques for Data Privacy Preserving in Cloud Computing Environments
DOI:https://doi.org/10.6025/isej/2019/6/2/37-48
Full_Text   PDF 1.31 MB   Download:   86  times
References:

[1] Liu, Hong., Ning, Huansheng., Xiong, Qingxu., Yang, Laurence T. (2013). Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, p.1-11, DOI 10.1109/ TPDS.2014.2308218, IEEE, 2013.
[2] Bedi, Rajeev Kumar., Singh, Jaswinder., Sunil Kumar Gupta. (2019). An efficient and secure privacy preserving multi-cloud storage framework for mobile devices, International Journal of Computers and Applications, p.1-12, DOI: 10.1080/1206212X.2019.1572847, Taylor & Francis group, 2019.
[3] Dhasarathan, Chandramohan., Thirumal Vengattaraman., Ponnurangam, Dhavachelvan. (2017).A secure data privacy preservation for on-demand cloud service, Journal of King Saud University – Engineering Sciences, p.144–150, http://dx.doi.org/10.1016/j.jksues. 2015.12.0021018-3639 _ 2015, Elsevier, 2017.
[4] Sánchez, David., Batet, Montserrat. (2017).Privacy-preserving data outsourcing in the cloud via semantic data splitting,
Computer Communications, 110 (2017), 187-201, http://dx.doi.org/10.1016/j.comcom.2017.06.012 0140-3664, Elsevier, 2017.
[5] Ni, Lina., Li, Chao., Wang, Xiao., Jiang, Honglu., Yu, Jiguo. (2018). DP-MCDBSCAN: Differential Privacy Preserving Multi-Core DBSCAN Clustering for Network User Data, Special section on Privacy Preservation for Large-scale user data in social
networks, p. 21053- 21063, Volume 6, Digital Object Identifier 10.1109/ACCESS.2018.2824798, IEEE Access, 2018.
[6] Wang, Xiaoliang., Bai, Liang., Yang, Qing., Wang, Liu., Jiang, Frank. (2019). A dual privacypreservation scheme for cloud-based eHealth systems, Journal of Information Security and Applications, 47 www.elsevier.com/locate/jisa, 132–138, https://
doi.org/10.1016/j.jisa.2019.04.010 2214-2126, Elsevier, 2019.
[7] Wang, Bing., Song, Wei., Lou, Wenjing, Hou, Y. Thomas. (2017). Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing, In: Proceedings of the IEEE Conference on Computer Communications IEEE INFOCOM 2017,
978-1-5090-5336- 0/17, IEEE, 2017.
[8] Lin, Keng-Pei., Chen, Ming-Syan. (2011). On the Design and Analysis of the Privacy-Preserving SVM Classifier, IEEE Transactions on Knowledge and Data Engineering, 23 (11), 10.1109/TKDE.2010.193, IEEE, November 3 2011.
[9] Qi Jia., Linke Guo., Zhanpeng Jin and Yuguang Fang. (2018). Preserving Model Privacy for Machine Learning in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, 29(8), Digital Object Identifier no. 10.1109/TPDS.2018.2809624,
IEEE, August 2018.
[10] Chen, Tingting., Zhong, Sheng. (2009). Privacy-Preserving Backpropagation Neural Network Learning, IEEE Transactions on Neural Networks, 1554-1564, 20(10), Digital Object Identifier 10.1109/TNN.2009.2026902, IEEE, October 2009.
[11] Hahn, Changhee., Hur, Junbeom. (2016). Efficient and privacy-preserving biometric identification in cloud, The Korean Institute of Communications Information Sciences, p. 135-139, http://dx.doi.org/10.1016/j.icte.2016.08.006, Elsevier, 2016.
[12] Guo, Shangwei ., Xiang, Tao., Li, Xiaoguo. (2019). Towards Efficient Privacy-Preserving Face Recognition in the Cloud, Signal Processing (2019), p. 1-28, doi: https://doi.org/10.1016/j.sigpro.2019.06.024.
[13] Zhang, Xuyun., Liu, Chang., Nepal, Surya., Pandey, Suraj and Chen, Jinjun. (2013). A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud, IEEE Transactions on Parallel
and Distributed systems, p. 1192-1202, 24(6), Digital Object Identifier no. 10.1109/TPDS.2012.238, IEEE, (June).
[14] Joshi, Bansidhar., Joshi, Bineet., Kritika Rani. (2017). Mitigating Data Segregation and Privacy Issues in Cloud Computing,
In the Proceedings of International Conference on Communication and Networks, Advances in Intelligent Systems and Computing 508, p. 175-182, DOI 10.1007/978-981-10-2750-5_18, Springer Nature Singapore Pte Ltd. 2017 N. Modi et al. (eds.), 2017.
[15] Qiu, Meikang., Gai, Keke., Zhao, Hui., Liu, Meiqin. (2017). Privacy-preserving smart data storage for financial industry in cloud computing”, Concurrency Computat Pract Exper. 2018; 30:e4278, p. 1-10, https://doi.org/10.1002/cpe.4278,
wileyonlinelibrary.com/ journal/cpe, John Wiley & Sons, Ltd, 2017.
[16] Du, Minxin., Wang, Qian. (2018). Member, IEEE, Meiqi He, Jian Weng, Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage”, IEEE Transactions on Information Forensics and Security, p. 2320-2332, 13(9), Digital
Object Identifier 10.1109/TIFS.2018.2818651, IEEE, September 2018.
[17] Gong, Jiaying., Xu, Yanyan., Zhao, Xiao. (2018). A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment, IETE Technical Review, 35: sup1, p. 76-84, DOI: 10.1080/02564602.2018.1526654, Taylor & Francis
group, 2018.
[18] Fan, Yongkai., Lin, Xiaodong., Liang, Wei ., Tan. Gang., Nanda, Priyadarsi. (2019). A secure privacy-preserving deduplication scheme for cloud computing, Future Generation Computer Systems, ScienceDirect, p. 127–135, https://doi.org/10.1016/
j.future.2019.04.046, Elsevier, 2019.
[19] Geeta S. Navale., Suresh N. Mali. (2018). Lossless and robust privacy preservation of association rules in data sanitization”, Springer Science+Business Media, LLC, part of Springer Nature, 1-14, https://doi.org/10.1007/s10586-018-2176-1, Springer, 2018.
[20] Pan, Yang ., Xiaolin, Gui., Jian, AN., Jing, Yao., Jiancai, Lin., Feng, Tian. (2014). A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing, Communications System Design, 73-84, (August).
[21] Adhirai, S., Paramjit Singh., Mahapatra, Rajendra Prasad. (2019). Circular interpolation and chronological-whale optimization-based privacy preservation in cloud, International Journal of Computers and Applications, 1-14, DOI: 10.1080/
1206212X.2018.1560668, Taylor & Francisgroup, 2019.
[22] Zhang, Xuyun., Dou, Wanchun., Pei, Jian., Nepal, Surya., Yang, Chi., Liu, Chang., Chen, Jinjun. (2013). Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud, IEEE Transactions on
Computers, TC-2013-12- 0869, 1-14, IEEE.
[23] Shen, Qinghua ., Liang, Xiaohui., Xuemin (Sherman) Shen., Lin, Xiaodong., Luo, Henry Y. (2014). Exploiting Geo-Distributed Clouds for an E-Health Monitoring System With Minimum Service Delay and Privacy Preservation, IEEE Journal of Biomedical
and Health Informatics, 430-439, 18(2), Digital Object Identifier 10.1109/JBHI.2013.2292829, IEEE, (March).
[24] Charlesworth, Andrew., Pearson, Siani. (2013). Developing accountability-based solutions for data privacy in the cloud”, Innovation: The European Journal of Social Science Research, 26, 1-2, 7-35, http://dx.doi.org/10.1080/13511610.2013.732753,
Taylor & Francis group.
[25] George, Tresa Mary., V., Shamna, S., Jubilant, J. (2016). Kizhakkethottam. An efficient Privacy-Preserving search scheme with access control for cloud data centers, ScienceDirect Procedia Technology, 310 – 317, doi: 10.1016/j.protcy.2016.08.112, Elsevier.
[26] Han, Shuguo., Ng, Wee Keong., Li Wan, Lee., Vincent C. S. (2010). Privacy-Preserving Gradient- Descent Methods, IEEE Transactions on Knowledge and Data Engineering, 884-899, 22(6), Digital Object Identifier no. 10.1109/TKDE.2009.153, IEEE,
(June).


Copyright 2013 socio.org.uk