Layer-based Privacy and Security Architecture for Cloud Data Sharing

被引:11
|
作者
Gupta, Ishu [1 ]
Singh, Niharika [2 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra, Haryana, India
[2] Univ Teknol PETRONAS, Seri Iskandar, Perak, Malaysia
关键词
Cloud Computing; Data Leakage; Data Privacy; Data Sensitivity; Information Security; Guilty Client; PERSONAL HEALTH RECORDS; PROXY RE-ENCRYPTION; IMAGE WATERMARKING; ACCESS-CONTROL; INFORMATION; SCHEME;
D O I
10.24138/jcomss.v15i2.617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider for applying security over each document and then transfer it to the client, we proposed a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categories require different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity: public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layer-based approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret, and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
引用
收藏
页码:173 / 185
页数:13
相关论文
共 50 条
  • [21] Privacy Principles for Sharing Cyber Security Data
    Fisk, Gina
    Ardi, Calvin
    Pickett, Neale
    Heidemann, John
    Fisk, Mike
    Papadopoulos, Christos
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197
  • [22] Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment
    Bingu, Rajesh
    Jothilakshmi, S.
    Srinivasu, N.
    INFORMATION SECURITY JOURNAL, 2024, 33 (01): : 1 - 15
  • [23] A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications
    Fernandez, Maribel
    Jaimunk, Jenjira
    Thuraisingham, Bhavani
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3495 - 3507
  • [24] Data Security and Privacy Protection in Public Cloud
    Shi, Yue
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4812 - 4819
  • [25] Towards Cloud based Smart Cities Data Security and Privacy Management
    Khan, Zaheer
    Pervez, Zeeshan
    Ghafoor, Abdul
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 806 - 811
  • [26] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [27] Improve Cloud Based IoT Architecture Layer Security - A Literature Review
    Kashyap, Neha
    Rana, Ajay
    Kansal, Vineet
    Walia, Himdweep
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 772 - 777
  • [28] Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
    Esposito, Christian
    De Santis, Alfredo
    Tortora, Genny
    Chang, Henry
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2018, 5 (01): : 31 - 37
  • [29] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [30] A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration
    Dubovitskaya, Alevtina
    Urovi, Visara
    Vasirani, Matteo
    Aberer, Karl
    Schumacher, Michael I.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 585 - 598