Layer-based Privacy and Security Architecture for Cloud Data Sharing

被引:11
|
作者
Gupta, Ishu [1 ]
Singh, Niharika [2 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra, Haryana, India
[2] Univ Teknol PETRONAS, Seri Iskandar, Perak, Malaysia
关键词
Cloud Computing; Data Leakage; Data Privacy; Data Sensitivity; Information Security; Guilty Client; PERSONAL HEALTH RECORDS; PROXY RE-ENCRYPTION; IMAGE WATERMARKING; ACCESS-CONTROL; INFORMATION; SCHEME;
D O I
10.24138/jcomss.v15i2.617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider for applying security over each document and then transfer it to the client, we proposed a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categories require different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity: public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layer-based approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret, and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
引用
收藏
页码:173 / 185
页数:13
相关论文
共 50 条
  • [1] Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 387 - 397
  • [2] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [3] Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey
    Hataba, Muhammad
    Sherif, Ahmed
    Mahmoud, Mohamed
    Abdallah, Mohamed
    Alasmary, Waleed
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 : 811 - 829
  • [4] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [5] Layer-based data security in the real-time environment
    Silin, M. (maxim.silin@cse-controls.com), 1600, Nuclear Institute, CK International House, 1-6 Yarmouth Place, W1J 7BU, United States (09):
  • [6] An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing
    Dewangan, Revati Raman
    Soni, Sunita
    Mishal, Ashish
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025, 18 (02) : 176 - 195
  • [7] A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
    Al Mayyahi, Mustafa Azeez
    Seno, Seyed Amin Hosseini
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1572 - 1580
  • [8] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676
  • [9] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [10] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064