A Data Ownership Privacy Provider Framework in Cloud Computing

Authors

  • N. Ambika  Research Scholar, Bharathiar University, Coimbatore, Tamil Nadu, India
  • Dr. M. Sujaritha  Associate Professor, Department of CSE, Sri Krishna College of Engineering & Technology, Coimbatore. Tamil Nadu, India

Keywords:

Cloud computing, Cloud security, Data centers, Anonymous Cloud.

Abstract

The complementary problem of secure storage of private cloud data has been studied extensively in the literature but cannot usually be applied while the data is in decrypted form for the duration of a computation. Secure multiparty computation and differential privacy are both powerful approaches to privacy preserving cloud computation on decrypted data, but are inapplicable to many real world cloud computations. In particular, jobs submitted to the cloud as arbitrary binary code are difficult to automatically reformulate as secure multiparty computations, and high differential privacy sometimes comes at the expense of highly imprecise, noisy results. In these cases, the level of privacy can sometimes be improved by concealing data ownership, provenance, and/or semantics from the participants in a computation in addition to or instead of anonymizing the data itself.

References

  1. Slamanig, D. (2011). More privacy for cloud users: Privacy-preserving resource usage in the cloud. In Selected Papers from the 4th Hot Topics in Privacy Enhancing Technologies (HotPETs), pp. 15-27.
  2. Jensen, M., S. Schage, and J. Schwenk (2010). Towards an anonymous access control and accountability scheme for cloud computing. In Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 540-541.
  3. Backes, M., J. Camenisch, and D. Sommer (2005). Anonymous yet accountable access control. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), pp. 40-46.
  4. Abbott, T., K. Lai, M. Lieberman, and E. Price (2007). Browser based attacks on Tor. In Proceedings of the 7th International Conference on Privacy Enhancing Technologies (PET), pp. 184-199.
  5. Hopper, N., E. Y. Vasserman, and E. Chan-Tin (2010). How much anonymity does network latency leak? ACM Transactions on Information and System Security (TISSEC), 13 (2).
  6. Freedman, M., E. Sit, J. Cates, and R. Morris (2002). Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 193-206.
  7. Cornelli, F., E. Damiani, S. di Vimercati, S. Paraboschi, and P. Samarati (2002). Choosing reputable servants in a P2P network. In Proceedings of the 11th International World Wide Web Conference (WWW), pp. 376-386.
  8. Gnutella (2010). http://www.gnutella.com.
  9. Damiani, E., S. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante (2002). A reputation based approach for choosing reliable resources in peer to peer networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS),pp. 207-216.
  10. He, Q., J. Yan, H. Jin, and Y. Yang (2009). ServiceTrust: Supporting reputation-oriented service selection. In Proceedings of the 7th International Joint Conference on Service oriented Computing, pp. 269-284.
  11. Bachrach, Y., A. Parnes, A. Procaccia, and J. Rosenschein (2009). Gossip based aggregation of trust in decentralized reputation systems. Journal of Autonomous Agents and Multiagent Systems (AAMAS) 19 (2), 153-172.
  12. Stoica, I., R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan (2001). Chord: A scalable peer to peer lookup service for internet applications. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer and Communications (SIGCOMM), pp. 149-160.
  13. Ratnasamy, S., P. Francis, M. Handley, R. Karp, and S. Schenker (2001). A scalable, content addressable network. In Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer and Communications (SIGCOMM), pp. 161-172.
  14. Zhao, B., L. Huang, J. Stribling, S. Rhea, A. Joseph, and J. Kubiatowicz (2004). Tapestry: A resilient global scale overlay for service deployment. IEEE Journal on Selected Areas in Communications (JSAC) 22 (1), 41-53.

Downloads

Published

2017-09-30

Issue

Section

Research Articles

How to Cite

[1]
N. Ambika, Dr. M. Sujaritha, " A Data Ownership Privacy Provider Framework in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.462-467, September-October-2017.