
Asian Journal of Engineering and Applied Technology (AJEAT)
Privacy Preserving Technique for Data Storage in Cloud Computing
Author : Jagpreet Kaur and Nitin GoelVolume 7 No.2 July-December 2018 pp 67-73
Abstract
With the emergence of Cloud computing, the traditional computing process has undergone a sea change. Cloud Computing has been proving to be a boon for IT industries in terms of its ability to provide cost effective, power efficient, extensible and pliable computing. Because of its substantial flexibility, Cloud Computing has become an escalate platform for the services of next generation. But inspite of all the advantages, security and privacy of the data being shared on Cloud remains a cause of concern for the users as well as service providers. This paper proposes a ‘Tortoise technique’ aiming to provide more privacy to user’s data without any kind of security threats from outside. As a part of the technique, reduced data is sent to cloud instead of the original encrypted data. We observed an improvement to an order of 2n in the security of data with the help of the proposed technique.
Keywords
Edge Detection, Cloud Computing, Privacy, Randomisation
References
[1] J. Heiser, “What you need to know about cloud computing security and compliance”, Gartner, Research, ID Number: G00168345, 2009.
[2] Peter Mell and Tim Granc, “The NIST definition of cloud computing”, 2011.
[3] Dikaiakos, D. Marios, Dimitrios Katsaros, Pankaj Mehra, George Pallis and Athena
[4] H. A. Y. E. S. Brian, T. Brunschwiler, H. Dill, H. Christ, B. Falsafi, M. Fischer and M. Kaiserswerth, “Cloud Computing”, Communications of the ACM, Vol. 517, pp. 9-112008.
[5] GTSI Group, “Cloud computing-building a framework for successful transition”, White Paper, GTSI Corporation,Vol. 2, No. 9, 2009.
[6] Krutz, L. Ronald and Russell Dean Vines, “Cloud security: A comprehensive guide to secure cloud computing”, Wiley Publishing, 2010.
[7] R. B. Bohn, J. Messina, F. Liu, J. Tong and J. Mao, “NISTcloudcomputingreferencearchitecture”,IEEE, pp. 594–596. 2011.
[8] Ramgovind, Sumant, Mariki M. Eloff and Elme Smith, “The management of security in cloud computing”, In Information Security for South Africa ISSA,IEEE, pp. 1-7, 2010.
[9] Peng, Junjie, Xuejun Zhang, Zhou Lei, Bofeng Zhang, Wu Zhang and Qing Li, “Comparison of several cloud computing platforms”, In Information Science and Engineering ISISE, Second International Symposium, IEEE, pp. 23-27, 2009.
[10] Zoho. [Online]. Available: http://www.zoho.com
[11] Google Docs. [Online]. Available: http://docs.google.com
[12] Vmware. [Online]. Available: http://www.vmware.com
[13] IDC.2017. [Online]. Available: http://www.idc.com/getdoc.jsp?containerId=prUS42321417
[14] R. Singh, S. Kumar and S. K. Agrahari, “Ensuring data storage security in cloud computing”, IOSR Journal of Engineering, Vol. 212, 17-21.2012
[15] K. Parsi, “Security Concerns of Data in Cloud Environments”, 2015
[16] International Electrotechnical Commission, Information Processing Systems, Open Systems Interconnection: Basic Reference Model. Part 4, Management Framework, [Geneva]: ISO/IEC, 1989.
[17] Kaur, Jagpreet, Sunny Singh and AmitKam, “Analysis of security issues and management standards in cloud computing”, In Computing for Sustainable Global Development INDIACom, 2nd International Conference, IEEE, pp. 1474-1478, 2015.
[18] H. Tianfield, “Security issues in cloud computing”, In Systems, Man, and Cybernetics SMC, IEEE International Conference, pp. 1082-1089, Oct. 2012.
[19] Subashini, Subashini and VeerarunaKavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, Vol. 341, pp. 1-11 2011.
[20] Liu, Ying, JayaprakashPisharath, Wei Keng Liao, GokhanMemik, AlokChoudhary and PradeepDubey, “Performance evaluation and characterization of scalable data mining algorithms”, In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, ACTA Press, Vol. 16, pp. 620-62, 2004.
[21] Modak, Masooda M. Aslam and M. Vijayalakshmi. “Privacy preserving data mining techniques in the cloud: A comparative analysis”, In VESIT, International Technological Conference, I-TechCON, 2014.
[22] V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin and Y. Theodoridis, “State-of-the-art in privacy preserving data mining”, ACM Sigmod Record,Vol. 331, pp. 50-57. 2004
[23] Y. Lindell and B. Pinkas, “Privacy preserving data mining”, Journal of Cryptology,Vol. 153, 2002
[24] Aggarwal, C. Charu and S. Yu Philip, “A general survey of privacy-preserving data mining models and algorithms”, InPrivacy-Preserving Data Mining, Springer, Boston, MA, pp. 11-52, 2008.
[25] Nayak, Gayatri and Swagatika Devi, “A survey on privacy preserving data mining: approaches and techniques”, International Journal of Engineering Science and Technology,Vol. 3, No. 3, 2011.
[26] Qi, Xinjun and MingkuiZong, “An overview of privacy preserving data mining”, Procedia Environmental Sciences,Vol. 12, pp. 1341-1347, 2012.
[27] M. B. Malik, M. A. Ghazi and R. Ali, “Privacy preserving data mining techniques: current scenario and future prospects”, In Computer and Communication Technology ICCCT, 2012 Third International Conference on pp. 26-32. IEEE, Nov. 2012.
[28] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 1005, pp. 571-588, 2002.
[29] P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, Technical report, SRI International, pp. 101-132, 1998.
[30] R. Agrawal and R. Srikant, “Privacy-preserving data mining”, In ACM Sigmod Record, Vol. 29, No. 2, pp. 439-450. ACM.2000.
[31] S. L. Warner, “Randomized response: A survey technique for eliminating evasive answer bias”, Journal of the American Statistical Association, Vol. 60309, pp. 63-69. 1965.
[32] B. Pinkas, “Cryptographic techniques for privacy-preserving data mining”, ACM Sigkdd Explorations Newsletter, Vol. 42, pp. 12-19, 2002.
[33] C. C. Aggarwal and S. Y. A. Philip, “Condensation approach to privacy preserving data mining”, In International Conference on Extending Database Technology, Springer, Berlin Heidelberg. pp. 183-199, 2004
[34] Y. Bassil, “Image steganography based on a parameterized canny edge detection algorithm”, ArXiv preprint ar Xiv: 1212.6259. 2012.
[35] N. Jain, S. Meshram and S. Dubey, “Image steganography using LSB and edge–detection technique”, International Journal of Soft Computing and Engineering (IJSCE) ISSN, Vol. 223, 2012.