Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud Computing (CC) is reforming many biological communities by furnishing associations with registering assets including simple organization, network, design, Romanization, and adaptability. This change in perspective raises an expansive scope of security and protection issues that must be thought about. Multi-tenure, loss of control, and trust are entering challenges in cloud processing conditions. This paper surveys the current advancements and a wide show of both earlier and frontier extends on cloud security and protection. We classify the current look into as per the cloud reference engineering coordination, asset control, physical asset, and cloud benefit administration layers, in spite of inspecting the current improvements in security safeguarding touchy information approaches in CC, such as, security risk demonstrating and protection upgrading conventions and arrangements.

     


  • Keywords


    Use about five key words or phrases in alphabetical order, Separated by Semicolon.

  • References


      [1] S. Pearson, “Privacy, security and trust in CC ,” in Privacy and Security for CC (S. Pearson and G. Yee, eds.), Computer Communications and Networks, pp. 3–42, Springer London, 2013.

      [2] E. U. Directive, “95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data,” Official Journal of the EC, vol. 23, 1995.

      [3] U. States., “Health insurance portability and accountability act of 1996 [micro form] : conference report (to accompany h.r. 3103).” http://nla.gov.au/nla.catvn4117366, 1996.

      [4] “Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environment.” Retrieved June 2015.

      [5] M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEX Inc.,

      [6] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, NIST CC Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292). USA: CreateSpace Independent Publishing Platform, 2012.

      [7] R. Dua, A. Raja, and D. Kakadia, “Virtualization vs containerization to support paas,” in Cloud Engineering (IC2E), 2014 IEEE International Conference on, pp. 610–614, March 2014.

      [8] D. Bernstein, "Containers and Cloud: From LXC to Docker to Kubernetes," IEEE CC , vol. 1, no. 3, pp. 81-84, 2014.

      [9] R. Pike, D. Presotto, K. Thompson, H. Trickey, and P. Winterbottom, “The use of name spaces in plan 9,” SIGOPS Oper. Syst. Rev., vol. 27, pp. 72–76, Apr. 1993.

      [10] NIST Special Publication 500–291 version 2, NIST CCStandards Roadmap, July 2013, Available at http://www.nist.gov/itl/cloud/publications.cfm.

      [11] B. Russell, “Realizing Linux Containers (LXC).” http://www.slideshare.net/BodenRussell/linuxcontainers next-gen- virtualization-for-cloud-atl-summit-ar4-3-copy. Retrieved October 2015.

      [12] U. S. F. Law, “Right to financial https://epic.org/privacy/rfpa/, 1978. privacy act of 1978.”

      [13] United Nations, “The Universal Declaration of Human Rights.”http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2015.

      [14] A. Westin, Privacy and Freedom. New Jork Atheneum, 1967.

      [15] D. Bigo, G. Boulet, C. Bowden, S. Carrera, J. Jeandesboz, and A. Scherrer, “Fighting cyber crime and protecting privacy in the cloud.” European Parliament, Policy Department C: Citizens’ Rights and Constitutional Affairs, October 2012.

      [16] S. Stalla-Bourdillon, “Liability exemptions wanted! internet intermediaries’ liability under uk law,” Journal of International Commercial Law and Technology, vol. 7, no. 4, 2012.

      [17] N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in CC ,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.

      [18] R. Banyal, P. Jain, and V. Jain, “Multi-factor authentication framework for CC ,” in Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on, pp. 105–110, Sept 2013.

      [19] R. Lomotey and R. Deters, “Saas authentication middleware for mobile consumers of iaas cloud,” in Services (SERVICES), 2013 IEEE Ninth World Congress on, pp. 448–455, June 2013.

      [20] H. Kim and S. Timm, “X.509 authentication and authorization in fermi cloud,” in Utility and CC(UCC), 2014 IEEE/ACM 7th International Conference on, pp. 732–737, Dec 2014.

      [21] B. Tang, R. Sandhu, and Q. Li, “Multi-tenancy authorization models for collaborative cloud services,” in Collaboration Technologies and Systems (CTS), 2013 International Conference on, pp. 132–138, May 2013.

      [22] L. Zhou, V. Varadharajan, and M. Hitchens, “Integrating trust with cryptographic role-based access control for secure cloud data storage,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 560–569, July 2013.

      [23] J. Sendor, Y. Lehmann, G. Serme, and A. Santana de Oliveira, “Platform level support for authorization in cloud services with oauth 2,” in Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E ’14, (Washington, DC, USA), pp. 458–465, IEEE Computer Society, 2014. infrastructure of the egi federated cloud,” in High Performance Computing Simulation (HPCS), 2015

      [24] C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arzen, F. Hernandez- Rodriguez, and E. Elmroth, “Improving cloud service re silience using brownout-aware loadbalancing,” in Reliable Cloud Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31–40, Oct 2014.

      [25] E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, “A synchronization mechanism for cloud accounting systems,” in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111–120, Sept 2014.

      [26] M. Anand, “Cloud monitor: Monitoring applications in cloud,” in CCin Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1–4, Oct 2012.

      [27] A. Brinkmann, C. Fiehe, A. Litvina, I. Lück, L. Nagel, K. Narayanan, F. Ostermair, and W. Thronicke, “Scalable monitoring system for clouds,” in Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and CC , UCC ’13, (Washington, DC, USA), pp. 351–356, IEEE Computer Society, 2013.

      [28] J. Nikolai and Y. Wang, “Hypervisor-based cloud intrusion detection system,” in Computing,Networking and Communications (ICNC), 2014 International Conference on, pp. 989–993, Feb 2014.

      [29] C. Basescu, A. Carpen-Amarie, C. Leordeanu, A. Costan, and G. Antoniu, “Managing data access onclouds: A generic framework for enforcing security policies,” in Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pp. 459–466, March 2011.

      [30] H. Takabi and J. Joshi, “Policy management as a service: An approach to manage policy heterogeneity in CCenvironment,” in System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 5500–5508, Jan 2012.

      [31] K. W. Hamlen, L. Kagal, and M. Kantarcioglu, “Policy enforcement framework for cloud data management.,” IEEE Data Eng. Bull., vol. 35, no. 4, pp. 39–45, 2012.

      [32] S. Fischer-Hubner, J. Angulo, and T. Pulls, “How can cloud users be supported in deciding on, tracking and controlling how their data are used” in Privacy and Identity Management for Emerging Services and Technologies (M. Hansen, J.-H. Hoepman, R. Leenes, and D. Whitehouse, eds.), vol. 421 of IFIP Advances in Information and Communication Technology, pp. 77–92, Springer Berlin Heidelberg, 2014.

      [33] E. Ayday, J. Raisaro, U. Hengartner, A. Molyneaux, and J.-P. Hubaux, “Privacy-preserving processing of raw genomic data,” in Data Privacy Management and Autonomous Spontaneous Security (J. Garcia-Alfaro, G. Lioudakis, N. Cuppens-Boulahia, S. Foley, and W. M. Fitzgerald, eds.), vol. 8247 of Lecture Notes in Computer Science, pp. 133147, Springer Berlin Heidelberg, 2014.

      [34] Y. Huang and I. Goldberg, “Outsourced private information retrieval,” in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES ’13, (New York, NY, USA), pp. 119–130, ACM, 2013.

      [35] K. Lauter, A. Lopez-Alt, and M. Naehrig, “Private computation on encrypted genomic data,” Tech. Rep. MSR-TR-2014-93, June 2014.


 

View

Download

Article ID: 20484
 
DOI: 10.14419/ijet.v7i4.6.20484




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.