Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

被引:0
|
作者
Stewart Kirubakaran S. [1 ]
Arunachalam V.P. [1 ]
Karthik S. [1 ]
Kannan S. [2 ]
机构
[1] Department of Computer Science & Engineering, SNS College of Technology, Tamilnadu, Coimbatore
[2] School of Computing Science and Engineering, Vellore Institute of Technology, Madhya Pradhesh, Bhopal
来源
关键词
cloud computing; cloud security; cloud service provider (CSP); data security; data user (DU); efficient auditing technique (EAT); privacy-preserving; Third-party auditor (TPA);
D O I
10.32604/csse.2023.026690
中图分类号
学科分类号
摘要
In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security- related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured in this work with the Efficient Authentication Technique (EAT) using the Group Signature method that is applied with Third-Party Auditor (TPA). The role of the auditor is to secure the data and guarantee shared data integrity. Additionally, the Cloud Service Provider (CSP) and Data User (DU) can also be the attackers that are to be handled with the EAT. Here, the major objective of the work is to enhance cloud security and thereby, increase Quality of Service (QoS). The results are evaluated based on the model effectiveness, security, and reliability and show that the proposed model provides better results than existing works. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1881 / 1895
页数:14
相关论文
共 50 条
  • [21] Security and privacy aware data aggregation on cloud computing
    Silva, Leandro V.
    Barbosa, Pedro
    Marinho, Rodolfo
    Brito, Andrey
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9
  • [22] Evaluation of The faults of Data Security and Privacy in the Cloud Computing
    Waleed, Al-Museelem
    Li Chunlin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 1838 - 1843
  • [23] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [24] Security and Privacy Issues in Cloud Computing Environment: A Survey Paper
    Ullah, Kaleem
    Khan, M. N. A.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (02): : 89 - 98
  • [25] Towards Healthcare Data Security in Cloud Computing
    Elmogazy, Huda
    Bamasak, Omaima
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 363 - 368
  • [26] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [27] Privacy and security issues in cloud computing using idyllic approach
    Kumar P.S.
    Parthiban L.
    Jegatheeswari V.
    International Journal of Networking and Virtual Organisations, 2019, 21 (01) : 30 - 42
  • [28] PRIVACY PRESERVING FOR DATA STORAGE SECURITY IN HOSPITAL CLOUD COMPUTING
    Wang, Y. R.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 106 - 107
  • [29] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [30] Study of Data Security and Privacy Preserving Solutions in Cloud Computing
    Choubey, Siddharth Dutt
    Namdeo, Mohit Kumar
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1101 - 1106