• #0 (no title)
  • #0 (no title)
  • About
  • Facebook
  • Twitter
  • RSS
(As ISO 9001:2015 Certified Publications)
    • Quick Search
    • Advanced Search
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription

Back to Journal

Home»Articles»Privacy Preserving Technique for Data Storage in Cloud Computing

JournalCover

Asian Journal of Engineering and Applied Technology (AJEAT)

Editor Dr. Seshadri Ramkumar
Print ISSN : 2249-068X
Frequency : Quarterly

Privacy Preserving Technique for Data Storage in Cloud Computing

Author : Jagpreet Kaur and Nitin Goel
Volume 7 No.2 July-December 2018 pp 67-73

Abstract

With the emergence of Cloud computing, the traditional computing process has undergone a sea change. Cloud Computing has been proving to be a boon for IT industries in terms of its ability to provide cost effective, power efficient, extensible and pliable computing. Because of its substantial flexibility, Cloud Computing has become an escalate platform for the services of next generation. But inspite of all the advantages, security and privacy of the data being shared on Cloud remains a cause of concern for the users as well as service providers. This paper proposes a ‘Tortoise technique’ aiming to provide more privacy to user’s data without any kind of security threats from outside. As a part of the technique, reduced data is sent to cloud instead of the original encrypted data. We observed an improvement to an order of 2n in the security of data with the help of the proposed technique.

Keywords

Edge Detection, Cloud Computing, Privacy, Randomisation

Full Text:

References

[1] J. Heiser, “What you need to know about cloud computing security and compliance”, Gartner, Research, ID Number: G00168345, 2009.
[2] Peter Mell and Tim Granc, “The NIST definition of cloud computing”, 2011.
[3] Dikaiakos, D. Marios, Dimitrios Katsaros, Pankaj Mehra, George Pallis and Athena
[4] H. A. Y. E. S. Brian, T. Brunschwiler, H. Dill, H. Christ, B. Falsafi, M. Fischer and M. Kaiserswerth, “Cloud Computing”, Communications of the ACM, Vol. 517, pp. 9-112008.
[5] GTSI Group, “Cloud computing-building a framework for successful transition”, White Paper, GTSI Corporation,Vol. 2, No. 9, 2009.
[6] Krutz, L. Ronald and Russell Dean Vines, “Cloud security: A comprehensive guide to secure cloud computing”, Wiley Publishing, 2010.
[7] R. B. Bohn, J. Messina, F. Liu, J. Tong and J. Mao, “NISTcloudcomputingreferencearchitecture”,IEEE, pp. 594–596. 2011.
[8] Ramgovind, Sumant, Mariki M. Eloff and Elme Smith, “The management of security in cloud computing”, In Information Security for South Africa ISSA,IEEE, pp. 1-7, 2010.
[9] Peng, Junjie, Xuejun Zhang, Zhou Lei, Bofeng Zhang, Wu Zhang and Qing Li, “Comparison of several cloud computing platforms”, In Information Science and Engineering ISISE, Second International Symposium, IEEE, pp. 23-27, 2009.

[10] Zoho. [Online]. Available: http://www.zoho.com
[11] Google Docs. [Online]. Available: http://docs.google.com
[12] Vmware. [Online]. Available: http://www.vmware.com
[13] IDC.2017. [Online]. Available: http://www.idc.com/getdoc.jsp?containerId=prUS42321417
[14] R. Singh, S. Kumar and S. K. Agrahari, “Ensuring data storage security in cloud computing”, IOSR Journal of Engineering, Vol. 212, 17-21.2012
[15] K. Parsi, “Security Concerns of Data in Cloud Environments”, 2015
[16] International Electrotechnical Commission, Information Processing Systems, Open Systems Interconnection: Basic Reference Model. Part 4, Management Framework, [Geneva]: ISO/IEC, 1989.
[17] Kaur, Jagpreet, Sunny Singh and AmitKam, “Analysis of security issues and management standards in cloud computing”, In Computing for Sustainable Global Development INDIACom, 2nd International Conference, IEEE, pp. 1474-1478, 2015.
[18] H. Tianfield, “Security issues in cloud computing”, In Systems, Man, and Cybernetics SMC, IEEE International Conference, pp. 1082-1089, Oct. 2012.
[19] Subashini, Subashini and VeerarunaKavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, Vol. 341, pp. 1-11 2011.
[20] Liu, Ying, JayaprakashPisharath, Wei Keng Liao, GokhanMemik, AlokChoudhary and PradeepDubey, “Performance evaluation and characterization of scalable data mining algorithms”, In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems, ACTA Press, Vol. 16, pp. 620-62, 2004.
[21] Modak, Masooda M. Aslam and M. Vijayalakshmi. “Privacy preserving data mining techniques in the cloud: A comparative analysis”, In VESIT, International Technological Conference, I-TechCON, 2014.
[22] V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin and Y. Theodoridis, “State-of-the-art in privacy preserving data mining”, ACM Sigmod Record,Vol. 331, pp. 50-57. 2004
[23] Y. Lindell and B. Pinkas, “Privacy preserving data mining”, Journal of Cryptology,Vol. 153, 2002
[24] Aggarwal, C. Charu and S. Yu Philip, “A general survey of privacy-preserving data mining models and algorithms”, InPrivacy-Preserving Data Mining, Springer, Boston, MA, pp. 11-52, 2008.
[25] Nayak, Gayatri and Swagatika Devi, “A survey on privacy preserving data mining: approaches and techniques”, International Journal of Engineering Science and Technology,Vol. 3, No. 3, 2011.
[26] Qi, Xinjun and MingkuiZong, “An overview of privacy preserving data mining”, Procedia Environmental Sciences,Vol. 12, pp. 1341-1347, 2012.
[27] M. B. Malik, M. A. Ghazi and R. Ali, “Privacy preserving data mining techniques: current scenario and future prospects”, In Computer and Communication Technology ICCCT, 2012 Third International Conference on pp. 26-32. IEEE, Nov. 2012.
[28] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 1005, pp. 571-588, 2002.
[29] P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, Technical report, SRI International, pp. 101-132, 1998.
[30] R. Agrawal and R. Srikant, “Privacy-preserving data mining”, In ACM Sigmod Record, Vol. 29, No. 2, pp. 439-450. ACM.2000.
[31] S. L. Warner, “Randomized response: A survey technique for eliminating evasive answer bias”, Journal of the American Statistical Association, Vol. 60309, pp. 63-69. 1965.
[32] B. Pinkas, “Cryptographic techniques for privacy-preserving data mining”, ACM Sigkdd Explorations Newsletter, Vol. 42, pp. 12-19, 2002.
[33] C. C. Aggarwal and S. Y. A. Philip, “Condensation approach to privacy preserving data mining”, In International Conference on Extending Database Technology, Springer, Berlin Heidelberg. pp. 183-199, 2004
[34] Y. Bassil, “Image steganography based on a parameterized canny edge detection algorithm”, ArXiv preprint ar Xiv: 1212.6259. 2012.
[35] N. Jain, S. Meshram and S. Dubey, “Image steganography using LSB and edge–detection technique”, International Journal of Soft Computing and Engineering (IJSCE) ISSN, Vol. 223, 2012.

Asian Journal of Engineering and Applied Technology is a peer-reviewed International research journal aiming at promoting and publishing original high quality research in all disciplines of engineering and applied technology. All research articles submitted to AJEAT should be original in nature, never previously published in any journal or presented in a conference or undergoing such process across the world. All the submissions will be peer-reviewed by the panel of experts associated with particular field. Submitted papers should meet the internationally accepted criteria and manuscripts should follow the style of the journal for the purpose of both reviewing and editing.

AJEAT is covering all aspects of Engineering and Applied Technology areas. Topics include, but are not limited to:

Aerospace engineering
Agricultural engineering
Architectural engineering
Bioengineering and biomedical engineering
Chemical engineering
Civil engineering
Computer engineering
Computer science and information science
Electrical engineering and electronics engineering
Environmental engineering

Industrial engineering
Metallurgical engineering
Ceramic engineering
Materials science
Metallurgy
Mechanical engineering
Nuclear engineering
Petroleum engineering
Plastics engineering and polymer science
Textile & Fashion Technology

With the emergence of Cloud computing, the traditional computing process has undergone a sea change. Cloud Computing has been proving to be a boon for IT industries in terms of its ability to provide cost effective, power efficient, extensible and pliable computing. Because of its substantial flexibility, Cloud Computing has become an escalate platform for the services of next generation. But inspite of all the advantages, security and privacy of the data being shared on Cloud remains a cause of concern for the users as well as service providers. This paper proposes a ‘Tortoise technique’ aiming to provide more privacy to user’s data without any kind of security threats from outside. As a part of the technique, reduced data is sent to cloud instead of the original encrypted data. We observed an improvement to an order of 2n in the security of data with the help of the proposed technique.

Editor-in-Chief
Dr. Seshadri Ramkumar
Department of Environmental Toxicology, Texas Tech University, Texas
[email protected]
Editorial Advisory Board
Dr. Kamarul Ariffin Bin Noordin
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Benjamin T.F. Chung
Department of Mechanical Engineering, University of Akron, Akron, USA
[email protected]
Dr. Mohd Faiz Bin Mohd Salleh
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Suhana Binti Mohd Said
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Norrima Binti Mokhtar
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]
Dr. Mohamadariff
Department of Electrical Engineering, University of Malaya, Malaysia
[email protected]

2016

2015

2014

  • Results
  • Asian Review of Mechanical Engineering (ARME)
  • career

2013

  • Home
  • Shop
  • My Account
  • Logout
  • Contact us
  • The Asian Review of Civil Engineering (TARCE)

2012

  • Asian Journal of Electrical Sciences(AJES)
  • Asian Journal of Computer Science and Technology (AJCST)
  • Asian Journal of Information Science and Technology (AJIST)
  • Asian Journal of Engineering and Applied Technology (AJEAT)
  • Asian Journal of Science and Applied Technology (AJSAT)
  • Asian Journal of Managerial Science (AJMS)
  • Asian Review of Social Sciences (ARSS)

2011

2010

    Table of Contents

    Editorial Note

    Editorial Dr. Seshadri Ramkumar

    Editor-in-Chief
    Dr. Seshadri Ramkumar
    Department of Environmental Toxicology, Texas Tech University, Texas
    [email protected]
    Editorial Advisory Board
    Dr. Kamarul Ariffin Bin Noordin
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Benjamin T.F. Chung
    Department of Mechanical Engineering, University of Akron, Akron, USA
    [email protected]
    Dr. Mohd Faiz Bin Mohd Salleh
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Suhana Binti Mohd Said
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Norrima Binti Mokhtar
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]
    Dr. Mohamadariff
    Department of Electrical Engineering, University of Malaya, Malaysia
    [email protected]

    Articles

Advanced Search

You can submit your research paper to the journal in just a few clicks. Please follow the steps outlined below: 1. Register your details and select to be an Author 2. Log in with your user name and password 3. ‘Start a new submission’ and follow these 5 steps:

[gravityform id="1" name="Registration" title="false" description="false"]

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue. Sed non rutrum mauris. Maecenas in dolor est. Donec eget sagittis mi. Sed non leo eu odio mollis pulvinar vitae et leo. Integer eu feugiat tortor. Duis massa purus, eleifend id erat eget, hendrerit semper risus. Suspendisse cursus varius dapibus

Lorem1 ipsum dolor sit amet, consectetur adipiscing elit. Nulla convallis ultricies scelerisque. Fusce dolor augue, sollicitudin eget lacus vitae, rutrum commodo lacus. Praesent ullamcorper facilisis dui. Sed suscipit id lorem ut dapibus. Integer dictum cursus nisl, quis ullamcorper augue.

Subscription

Subscription (for 12 issues):
Rs. 5000; Overseas - USD 500;
Cheque drawn in favour of "Informatics Publishing Limited"
Click here to download online subscription form

Download

DD Mailing Address

Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet,
Lorem1 ipsum dolor sit amet.

BACK TO TOP

Outstanding Scholars

The Journals honor Outstanding Scholars in various fields. Scholar of the Month should have contributed to their field and to the larger community. Recipients will be nominated by the Advisory Board and approved by the Editor-in-Chief of the allied journals published by The Research Publication. Scholar of the Month will be displayed in the web portal of the concerned journal.

Please send your brief write up to [email protected]

Editors and Reviewers

The Research Publication is seeking qualified researchers to join its editorial team as Associate Editor, Editorial Advisory Board Member, and Reviewers.
Kindly send your details to [email protected]

Call For Papers

Authors are requested to submit their papers electronically to [email protected] with mentioning the journal title.

Mailing Address

The Research Publication 1/611, Maruthi Nagar, Rakkipalayam Post, Coimbatore – 641 031, Tamil Nadu, India Phone No.: 0422 2461001

  • About
  • Editorial Policy
  • Author Guidelines
  • Contact us
  • Copyright
  • Facebook
  • Twitter
  • RSS

© 2015 The Research Publication. All rights reserved.

The Research Publication
  • Home
  • Editorial Policy
  • Author Guidelines
  • Submission
  • Copyright Form
  • Career
  • Contact us
  • Subscription