Layer-based Privacy and Security Architecture for Cloud Data Sharing

被引:11
|
作者
Gupta, Ishu [1 ]
Singh, Niharika [2 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra, Haryana, India
[2] Univ Teknol PETRONAS, Seri Iskandar, Perak, Malaysia
关键词
Cloud Computing; Data Leakage; Data Privacy; Data Sensitivity; Information Security; Guilty Client; PERSONAL HEALTH RECORDS; PROXY RE-ENCRYPTION; IMAGE WATERMARKING; ACCESS-CONTROL; INFORMATION; SCHEME;
D O I
10.24138/jcomss.v15i2.617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider for applying security over each document and then transfer it to the client, we proposed a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categories require different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity: public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layer-based approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret, and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
引用
收藏
页码:173 / 185
页数:13
相关论文
共 50 条
  • [31] Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing
    Ramasamy, S.
    Gnanamurthy, R. K.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 159 - 171
  • [32] Secret sharing for cloud data security: a survey
    Attasena, Varunya
    Darmont, Jerome
    Harbi, Nouria
    VLDB JOURNAL, 2017, 26 (05): : 657 - 681
  • [33] On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing
    Zhang, Jindan
    Wang, Baocang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 405 - 413
  • [34] Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud
    Pei, Xin
    Wang, Yongjian
    Yao, Wei
    Lin, Jiuchuan
    Peng, Ruxiang
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 737 - 743
  • [35] Secret sharing for cloud data security: a survey
    Varunya Attasena
    Jérôme Darmont
    Nouria Harbi
    The VLDB Journal, 2017, 26 : 657 - 681
  • [36] Security and accountability for sharing the data stored in the cloud
    Mohammed, Mostafa Abdulghafoor
    Tapus, Nicolae
    Salih, Zeyad Hussein
    Hasan, Raed Abdul Kareem
    2016 15TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH, 2016,
  • [37] The Data Sharing Security System of Cloud Storage
    Liu, Shenglong
    Zhang, Ge
    Xia, Yuxiao
    Yang, Ruxia
    INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021, 2021, 11884
  • [38] A Privacy Enhanced Search Approach for Cloud-Based Medical Data Sharing
    Liu, Lu
    Sun, Jingchao
    Li, Jianqiang
    Li, Rong
    Li, Juan
    Meng, Xi
    Li, Huifang
    Yang, Jijiang
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1032 - 1037
  • [39] An ORAM-based privacy preserving data sharing scheme for cloud storage
    Yuan, Dandan
    Song, Xiangfu
    Xu, Qiuliang
    Zhao, Minghao
    Wei, Xiaochao
    Wang, Hao
    Jiang, Han
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 1 - 9
  • [40] CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing
    Hoerandner, Felix
    Krenn, Stephan
    Migliavacca, Andrea
    Thiemer, Florian
    Zwattendorfer, Bernd
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 742 - 749