Privacy Preserving Technique for Data Storage in Cloud Computing
DOI:
https://doi.org/10.51983/ajeat-2018.7.2.1007Keywords:
Edge Detection, Cloud Computing, Privacy, RandomisationAbstract
With the emergence of Cloud computing, the traditional computing process has undergone a sea change. Cloud Computing has been proving to be a boon for IT industries in terms of its ability to provide cost effective, power efficient, extensible and pliable computing. Because of its substantial flexibility, Cloud Computing has become an escalate platform for the services of next generation. But inspite of all the advantages, security and privacy of the data being shared on Cloud remains a cause of concern for the users as well as service providers. This paper proposes a ‘Tortoise technique’ aiming to provide more privacy to user’s data without any kind of security threats from outside. As a part of the technique, reduced data is sent to cloud instead of the original encrypted data. We observed an improvement to an order of 2n in the security of data with the help of the proposed technique.
References
J. Heiser, "What you need to know about cloud computing security and compliance", Gartner, Research, ID Number: G00168345, 2009.
P. Mell and T. Granc, "The NIST definition of cloud computing", 2011.
D. Marios Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, and Athena.
B. H. A. Y. E. S. Brian, T. Brunschwiler, H. Dill, H. Christ, B. Falsafi, M. Fischer, and M. Kaiserswerth, "Cloud Computing", Communications of the ACM, vol. 517, pp. 9-112008.
GTSI Group, "Cloud computing-building a framework for successful transition", White Paper, GTSI Corporation, vol. 2, no. 9, 2009.
L. Ronald Krutz and Russell Dean Vines, "Cloud security: A comprehensive guide to secure cloud computing", Wiley Publishing, 2010.
R. B. Bohn, J. Messina, F. Liu, J. Tong, and J. Mao, "NISTcloudcomputingreferencearchitecture", IEEE, pp. 594–596. 2011.
S. Ramgovind, M. E. Mariki, and E. Smith, "The management of security in cloud computing", In Information Security for South Africa ISSA, IEEE, pp. 1-7, 2010.
J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, "Comparison of several cloud computing platforms", In Information Science and Engineering ISISE, Second International Symposium, IEEE, pp. 23-27, 2009.
Zoho. [Online]. Available: http://www.zoho.com
Google Docs. [Online]. Available: http://docs.google.com
Vmware. [Online]. Available: http://www.vmware.com
IDC.2017. [Online]. Available: http://www.idc.com/getdoc.jsp?containerId=prUS42321417
R. Singh, S. Kumar, and S. K. Agrahari, "Ensuring data storage security in cloud computing", IOSR Journal of Engineering, vol. 212, 17-21. 2012.
K. Parsi, "Security Concerns of Data in Cloud Environments", 2015.
International Electrotechnical Commission, "Information Processing Systems, Open Systems Interconnection: Basic Reference Model. Part 4, Management Framework", [Geneva]: ISO/IEC, 1989.
J. Kaur, S. Singh, and A. Kam, "Analysis of security issues and management standards in cloud computing", In Computing for Sustainable Global Development INDIACom, 2nd International Conference, IEEE, pp. 1474-1478, 2015.
H. Tianfield, "Security issues in cloud computing", In Systems, Man, and Cybernetics SMC, IEEE International Conference, pp. 1082-1089, Oct. 2012.
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, vol. 341, pp. 1-11, 2011.
Y. Liu, J. Pisharath, W. K. Liao, G. Memik, A. Choudhary, and P. Dubey, "Performance evaluation and characterization of scalable data mining algorithms", In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, ACTA Press, vol. 16, pp. 620-62, 2004.
M. M. Aslam Modak, M. Vijayalakshmi, "Privacy preserving data mining techniques in the cloud: A comparative analysis", In VESIT, International Technological Conference, I-TechCON, 2014.
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-the-art in privacy preserving data mining", ACM Sigmod Record, vol. 331, pp. 50-57, 2004.
Y. Lindell and B. Pinkas, "Privacy preserving data mining", Journal of Cryptology, vol. 153, 2002.
C. Charu Aggarwal and S. Y. A. Philip, "A general survey of privacy-preserving data mining models and algorithms", In Privacy-Preserving Data Mining, Springer, Boston, MA, pp. 11-52, 2008.
G. Nayak and S. Devi, "A survey on privacy preserving data mining: approaches and techniques", International Journal of Engineering Science and Technology, vol. 3, no. 3, 2011.
X. Qi and M. Zong, "An overview of privacy preserving data mining", Procedia Environmental Sciences, vol. 12, pp. 1341-1347, 2012.
M. B. Malik, M. A. Ghazi, and R. Ali, "Privacy preserving data mining techniques: current scenario and future prospects", In Computer and Communication Technology ICCCT, 2012 Third International Conference on, pp. 26-32. IEEE, Nov. 2012.
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 1005, pp. 571-588, 2002.
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression", Technical report, SRI International, pp. 101-132, 1998.
R. Agrawal and R. Srikant, "Privacy-preserving data mining", In ACM Sigmod Record, vol. 29, no. 2, pp. 439-450. ACM. 2000.
S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias", Journal of the American Statistical Association, vol. 60309, pp. 63-69, 1965.
B. Pinkas, "Cryptographic techniques for privacy-preserving data mining", ACM Sigkdd Explorations Newsletter, vol. 42, pp. 12-19, 2002.
C. C. Aggarwal and S. Y. A. Philip, "Condensation approach to privacy preserving data mining", In International Conference on Extending Database Technology, Springer, Berlin Heidelberg, pp. 183-199, 2004.
Y. Bassil, "Image steganography based on a parameterized canny edge detection algorithm", ArXiv preprint ar Xiv: 1212.6259, 2012.
N. Jain, S. Meshram, and S. Dubey, "Image steganography using LSB and edge–detection technique", International Journal of Soft Computing and Engineering (IJSCE) ISSN, vol. 223, 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.