Skip to main content

Data Owner Centric Approach to Ensure Data Protection in Cloud Environment

  • Conference paper
Intelligent Distributed Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 321))

  • 1843 Accesses

Abstract

Last few years the latest trend of computing has been cloud computing. Cloud has brought remarkable advancement in individual as well as IT sector. But still many organisations are lagging behind in using cloud services. Major issue that affect them is related to data protection at cloud and afraid of sensitive data leakage by intruders. To solve this problem a data protection model has been designed so that data owner feels free to use cloud services. Proposed model is highly secure and data is under control of data owner itself. Re-encryption, HMAC and Identity based user authentication techniques are used in this model to make it more effective and attractive to use this model in real world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hwang, J.-J., Chuang, H.-K., Hsu, Y.-C., Wu, C.-H.: A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, National Science Council of Taiwan Government

    Google Scholar 

  2. Fan, C.-I., Huang, S.-Y.: Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE (2011)

    Google Scholar 

  3. Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)

    Google Scholar 

  4. Mohamed, E.M., EI-Etriby, S.: Randomness Testing of Modem Encryption Techniques in Cloud Environment. In: 8th International Conference on Informatics and Systems (2012)

    Google Scholar 

  5. Xu, Z., Martin, K.M.: Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)

    Google Scholar 

  6. Huang, K.-Y., Luo, G.-H., Yuan, S.-M.: SSTreasury+: A Secure and Elastic Cloud Data Encryption System. In: International Conference on Genetic and Evolutionary Computing. IEEE (2012)

    Google Scholar 

  7. Sur, C., Park, Y., Shin, S.U., Seo, C., Rhee, K.H.: Certificate-Based Proxy Re-Encryption for Public Cloud Storage. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE (2013)

    Google Scholar 

  8. Zhu, S., Yang, X., Wu, X.: Secure Cloud File System with Attribute based Encryption. In: International Conference on Intelligent Networking and Collaborative Systems. IEEE (2013)

    Google Scholar 

  9. Mowbray, M., Pearson, S.: Protecting Personal Information in Cloud Computing. Springer-Verlag (2012)

    Google Scholar 

  10. Liu, J., Wan, Z., Gu, M.: Hierarchical Attribute-Set Based Encryption for Scalable. In: Flexible and Fine-Grained Access Control in Cloud Computing. Springer-Verlag (2011)

    Google Scholar 

  11. Sood, S.K.: A Highly Secure Hybrid Security model for Data Security at Cloud. Submitted to Security and Communication Networks. John Wiley and Sons, Interscience (2012); Special Issue on Trust and Security in Cloud Computing

    Google Scholar 

  12. Sood, S.K.: A Combined Approach to Ensure Data Security in Cloud Computing. Submitted to Journal of Network and Computer Applications (2012)

    Google Scholar 

  13. Buyya, R., Vecchiola, C., Selvi, S.T.: Mastering Cloud Computing Foundations and Applications Programming. Morgan Kaufmann, USA

    Google Scholar 

  14. Cheng, F.: Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm. Springer Science+Business Media (2011)

    Google Scholar 

  15. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajara, M.: A survey on security issues and solutions at different layers of Cloud computing. Springer (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanupriya Dhawan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Dhawan, K., Sharma, M. (2015). Data Owner Centric Approach to Ensure Data Protection in Cloud Environment. In: Buyya, R., Thampi, S. (eds) Intelligent Distributed Computing. Advances in Intelligent Systems and Computing, vol 321. Springer, Cham. https://doi.org/10.1007/978-3-319-11227-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11227-5_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11226-8

  • Online ISBN: 978-3-319-11227-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics