Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3102304.3102314acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Survey on Data Confidentiality and Privacy in Cloud Computing

Published: 19 July 2017 Publication History
  • Get Citation Alerts
  • Abstract

    Cloud computing is often referred to as the technology of the decade. Current Cloud systems present critical limitations to protecting users' data confidentiality. This survey presents a review of the three essential data security attributes in the context of Cloud computing, namely, availability, integrity and confidentiality. It explores numerous research efforts to enhance the security and privacy of data in the Cloud with a focus on maintaining data confidentiality. Recent solutions are critically analysed, and their advantages and limitations are discussed. The paper finishes with a discussion on the future research opportunities and challenges on data confidentiality in the Cloud.

    References

    [1]
    H Elmogazy and O Bamasak. 2013. Towards healthcare data security in cloud computing. In Proceedings of 8th International Conference for Internet Technology and Secured Transactions (ICITST) 9--12 Dec. 2013.
    [2]
    J L. Han. M Yang. C L. Wang. & S S Xu. 2012. Towards healthcare data security in cloud computing. In Proceedings of Second International Conference on (IMAC), 2012, 714--717.Z
    [3]
    Wan. J Liu. and R H. Deng. 2012. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. IEEE Transactions on Information Forensics and Security, 7, 743--754.
    [4]
    M Zhou. R Zhang. W Xie. W Qian. and A Zhou. 2010. Security and Privacy in Cloud Computing: A Survey. In Semantics Knowledge and Grid (SKG), In Proceedings of Sixth International Conference on Semantics, Knowledge and Grids 2010, 105--112.
    [5]
    T. Chia. 2012. Confidentiality, Integrity, Availability: The three components of the CIA Triad (2012). Retrieved 06 February 2017 from http://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/
    [6]
    B W. Yuefa Dai. Yaqiang Gu. Quan Zhang. and Chaojing Tang. 2009 Data Security Model for Cloud Computing. In Proceedings of International Workshop on Information Security and Application (IWISA 2009), Qingdao, China, 2009, pp. 141--144.
    [7]
    Z Balogh. and M Turcani. 2016. Modeling of data security in cloud computing. In proceedings of Annual IEEE Systems Conference 2016 (SysCon), 1--6.
    [8]
    V K Pant. J Prakash and A Asthana. 2015. Three step data security model for cloud computing based on RSA and steganography. In Green Computing and Internet of Things (ICGCIoT). In Proceedings of International Conference on Green Computing and Internet of Things (ICGCIoT) 2015, 490--494.
    [9]
    S Raju. & Y M. Sirajudeen. 2014. Data security in Cloud Computing using Cramer-Shoup cryptosystem. In Contemporary Computing and Informatics. In Proceedings of International Conference on Contemporary Computing and Informatics (IC3I), 2014, 343--346.
    [10]
    S A Pitchay. W A. A. Alhiagem. F Ridzuan. and M M. Saudi. 2015. A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. In Proceedings of 17th UKSim-AMSS International Conference on Modelling and Simulation 2015 (UKSim), 201--205.
    [11]
    S Kaur. and V Wasson. 2015. Enhancement in Homomorphic Encryption Scheme for Cloud Data Security. In Next Generation Mobile Applications, Services and Technologies. In Proceedings of 9th International Conference on Next Generation Mobile Applications, Services and Technologies 2015, 54--59.
    [12]
    A Carlin. M Hammoudeh. and O Aldabbas. 2015a. Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges. International Journal of Advanced Computer Science and Applications, 6(6) pp. 1--15.
    [13]
    A Carlin. M Hammoudeh. and O Aldabbas. 2015b. 'Defence for Distributed Denial of Service Attacks in Cloud Computing. Procedia Computer Science, 73 pp. 490--497.
    [14]
    I Ghafir. V Prenosil. and M Hammoudeh. 2016. Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution. In Proceedings of International Conference on Advances in Computing, Electronics and Communication, 2016.
    [15]
    A Bhandari. A Gupta. and D Das. 2016. Secure algorithm for cloud computing and its applications. In proceedings of 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, 188--192.
    [16]
    S K Saroj. S K. Chauhan. A K. Sharma. and S. Vats. 2015. Threshold Cryptography Based Data Security in Cloud Computing. In Computational Intelligence & Communication Technology (CICT). In Proceedings of IEEE International Conference on Computational Intelligence and Communication Technology, CICT 2015, 202--207.
    [17]
    E Saleh. and C Meinel. 2013. HPISecure: Towards Data Confidentiality in Cloud Applications. 13--16 May 2013.
    [18]
    W C. Garrison. A Shull. S Myers. and A J. Lee. 2016. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. In Proceedings of IEEE Symposium on Security and Privacy (SP) 22--26 May 2016.
    [19]
    A Abuarqoub. M Hammoudeh. B Adebisi. S Jabbar. A Bounceur. and H Al-Bashar. 2017. Dynamic clustering and management of mobile wireless sensor networks. Computer Networks, Volume 117, 22 April 2017, Pages 62--75.
    [20]
    M Hammoudeh. R Newma. C Dennett. S Mount. and O Aldabbas. 2015. Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-Modal Wireless Sensor Networks. Sensors, 15(9) pp. 22970--23003.
    [21]
    M Hammoudeh. F Al-Fayez. H Lloyd. R Newman. B Adebisi. A Bounceur. and A Abuarqoub 2017. A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols. IEEE Sensors Journal.

    Cited By

    View all
    • (2022)Self-Sovereign Identity Solution for Blockchain-Based Land Registry SystemMobile Information Systems10.1155/2022/89304722022Online publication date: 1-Jan-2022
    • (2022)A literature survey of security issues in Cloud, Fog, and Edge IT infrastructureElectronic Commerce Research10.1007/s10660-022-09615-yOnline publication date: 18-Oct-2022
    • (2022)Software as a Service Challenges: A Systematic Literature ReviewProceedings of the Future Technologies Conference (FTC) 2022, Volume 310.1007/978-3-031-18344-7_17(257-272)Online publication date: 14-Oct-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
    July 2017
    325 pages
    ISBN:9781450348447
    DOI:10.1145/3102304
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • LABSTICC: Labsticc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 July 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud computing
    2. confidentiality
    3. cryptography
    4. decryption
    5. encryption

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICFNDS '17

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Self-Sovereign Identity Solution for Blockchain-Based Land Registry SystemMobile Information Systems10.1155/2022/89304722022Online publication date: 1-Jan-2022
    • (2022)A literature survey of security issues in Cloud, Fog, and Edge IT infrastructureElectronic Commerce Research10.1007/s10660-022-09615-yOnline publication date: 18-Oct-2022
    • (2022)Software as a Service Challenges: A Systematic Literature ReviewProceedings of the Future Technologies Conference (FTC) 2022, Volume 310.1007/978-3-031-18344-7_17(257-272)Online publication date: 14-Oct-2022
    • (2021)Digital Twin for Accelerating Sustainability in Positive Energy District: A Review of Simulation Tools and ApplicationsFrontiers in Sustainable Cities10.3389/frsc.2021.6632693Online publication date: 21-Jun-2021
    • (2021)Machine Learning and Artificial Intelligence for Digital Twin to Accelerate Sustainability in Positive Energy DistrictsData-driven Analytics for Sustainable Buildings and Cities10.1007/978-981-16-2778-1_20(411-422)Online publication date: 12-Sep-2021
    • (2020)A Context-Aware Middleware Cloud Approach for Integrating Precision Farming Facilities into the IoT toward Agriculture 4.0Applied Sciences10.3390/app1003081310:3(813)Online publication date: 23-Jan-2020
    • (2020)Investigation of Cloud Computing Barriers: A Case Study in Saudi Arabian SMEsJournal of Information Systems Engineering and Management10.29333/jisem/85345:4(em0129)Online publication date: 2020
    • (2020)Cloud Computing Adoption Barriers Faced by Saudi Manufacturing SMEs2020 15th Iberian Conference on Information Systems and Technologies (CISTI)10.23919/CISTI49556.2020.9140940(1-6)Online publication date: Jun-2020
    • (2020)SEVA: Secure E-Voting Application in Cyber Physical SystemCyber-Physical Systems10.1080/23335777.2020.1837250(1-31)Online publication date: 12-Nov-2020
    • (2020)Towards Inclusive Privacy Protections in the CloudApplied Cryptography and Network Security Workshops10.1007/978-3-030-61638-0_19(337-359)Online publication date: 14-Oct-2020
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media