A Review on Biometric based Privacy Preserving and Public Auditing Schemes in Cloud Computing Environment

Authors

  • Sarita Motghare  Research Scholar, CSE, Medicaps University, Indore, Madhya Pradesh, India
  • Dr. C. S. Satsangi  Professor, Department of Computer Science and Engineering, Medicaps University, Indore, Madhya Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT183869

Keywords:

Cloud Computing, Public Key Infrastructure, Privacy Preserving in cloud, Public Auditing Scheme

Abstract

Cloud technology is very useful for the business development, as it brings about astonishing results in a short time. It is human nature that we trust those things, which are present in front of our eyes. However, in case of cloud computing, the data is mostly outsourced. There always remains a concern for the security and integrity of the data. The privacy of the user is also an important area of concern. Many systems and technique are being developed to address these issues, but still there is always a scope of improvement. While addressing the issues related to the user privacy and data security and integrity, we must consider the efficiency of the system while accessing and searching for the data. In this paper, we discuss about the major challenges in cloud environment. Also, presented is a brief overview on existing research that has been carried out in the above-mentioned areas.

References

  1. Liehuang Zhu, Chuan Zhang, Chang Xu, Ximeng Liu, And Cheng Huang, “An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing”, Volume 6, IEEE Access March 2018.
  2. XialiHei, Xiaojiang Du, “Biometric-based two-level secure access control for Implantable Medical Devices during emergencies”, in 2011 Proceedings IEEE INFOCOM.
  3. Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, “Privacy-Preserving FingerCodes Authentication”, in Proceedings of the 12th ACM workshop on Multimedia and security, Pages 231-240 , September 2010.
  4. Yan Huang, LiorMalka, David Evans, Jonathan Katz, “Efficient Privacy-Preserving Biometric Identification”,18th Network and Distributed System Security Conference (NDSS 2011), 6-9 February 2011.
  5. Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing”, in computers & security, Volume 72,p 1–12, Elsevier 2017
  6. Jin Li, Jingwei Li, Xiaofeng Chen, ChunfuJia, and WenjingLou,”Identity-Based Encryption with Outsourced Revocation in Cloud Computing”, IEEE Transactions On Computers, Vol. 64, NO. 2, FEBRUARY 2015.
  7. Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee, and Wenjing Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management”,IEEE Transactions On Parallel And Distributed Systems, Vol. 25, NO. 6, JUNE 2014.
  8. Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang, “Securely Outsourcing Attribute-Based Encryption with Checkability”, IEEE Transactions On Parallel And Distributed Systems, VOL. 25, NO. 8, AUGUST 2014.
  9. Yinghui Zhang , Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You, “Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing”,in computers & security, Elsevier 2016.
  10. John Bethencourt, Amit Sahai, Brent Waters, “Ciphertext-Policy Attribute-Based Encryption”, IEEE Symposium on Security and Privacy (SP '07),IEEE 2007.
  11. Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, And Sang Uk Shin, “Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage”, IEEE Access 2018.
  12. Jian Liu, Kun Huang, Hong Rong, Huimei Wang and Ming Xian, "Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage", IEEE Transactions On Information And Security, Vol. 1 No 2015.
  13. Boyang Wang, Baochun Li, Hui Li, “Panda: Public Auditing for Shared Datawith Efficient User Revocation in the Cloud”, IEEE Transactions On Services Computing, Vol. 8, No. 1, January/February 2015.
  14. Cong Wang, Qian Wang, KuiRen, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE Transactions On Services Computing, Vol. 5, No. 2, April-June 2012.
  15. Na Wang, Junsong Fu, Bharat K. Bhargava, Jiwen Zeng, “Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol13, Issue 10, Oct 2018.
  16. Yuzhe Tang, Ling Liu, “Privacy-Preserving Multi-Keyword Searching Information Networks”, IEEE Transactions on Knowledge and Data Engineering, VOL. 27, NO. 9, SEPTEMBER 2015.

Downloads

Published

2018-12-30

Issue

Section

Research Articles

How to Cite

[1]
Sarita Motghare, Dr. C. S. Satsangi, " A Review on Biometric based Privacy Preserving and Public Auditing Schemes in Cloud Computing Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.201-208, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183869