A survey paper of data access privilege scheme in cloud storage server for user privacy problem

2015 ◽  
Vol 28 (4) ◽  
pp. 203-206
Author(s):  
Smita Arjun Wagh ◽  
◽  
B.padma vathi

Storing the data in cloud helps in satisfying the demand of data access at anyplace, anytime. In cloud storage, users authenticate whether the data has been stored to the cloud storage server correctly. In order to enhance the storage provision, an Effectual Homomorphic Tag based Block for Dynamic Provable Data Possession (EHTB-DPDP) framework has been designed. This framework checks for the data integrity in the cloud storage server. The existing PDP, DPDP schemes were analyzed and the drawbacks encountered in those systems have been reframed using the proposed methodology. The major benefit of the proposed EHTB-DPDP is that it offers an effectual dynamic provable data possession and data integrity. This scheme spotlights on the integrity of the remote data by reducing data storage space, so that users can retrieve data efficiently. This security enhancement is achieved by the block tagging methodology. In addition, converting the variable block size to the fixed block size using hash function is also investigated. The feasibility of the scheme is proved by aanlyzing the security and the performance


2015 ◽  
Vol 2015 ◽  
pp. 1-17
Author(s):  
Shyamala Devi Munisamy ◽  
Arun Chokkalingam

Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposedAsymmetric Classifier Multikeyword Fuzzy Searchmethod provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.


Author(s):  
Gandeva Bayu Satrya

The rapid development of cloud storage technology paired with the prevalence of smartphone usage presents wide-ranging challenges for digital forensics practitioners. Data are more easily uploaded and shared between multiple devices and across multiple platforms. So, it has increased the opportunities for criminality. Criminality undertaken in cloud computing can be directly seen on logs stored on the cloud storage server, which records user activity. However, because of user privacy protection, these logs cannot be easily used as evidence in court. This issue emphasizes the need for a reliable means of identifying, acquiring, and preserving evidential data from the client-side. This study identifies the data artifacts of a user accessing Dropbox via smartphone (Android Lollipop and Android Nougat). The data are from performing several common activities such as installing, signing up, uploading, downloading, sharing, and others. About 14 artifacts are identified by documenting the Dropbox client database changing contents as these activities are carried out. This study increases knowledge of the artifacts that are leftover by Dropbox client on Android smartphones. The results propose that these methods can be used by digital forensics investigators in carrying out investigations and cyberlaw practitioners as guidance in criminal cases.


2016 ◽  
Vol 96 (4) ◽  
pp. 5295-5314 ◽  
Author(s):  
Xiong Li ◽  
Saru Kumari ◽  
Jian Shen ◽  
Fan Wu ◽  
Caisen Chen ◽  
...  

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2011 ◽  
Vol 8 (3) ◽  
pp. 801-819 ◽  
Author(s):  
Huang Ruwei ◽  
Gui Xiaolin ◽  
Yu Si ◽  
Zhuang Wei

In order to implement privacy-preserving, efficient and secure data storage and access environment of cloud storage, the following problems must be considered: data index structure, generation and management of keys, data retrieval, treatments of change of users? access right and dynamic operations on data, and interactions among participants. To solve those problems, the interactive protocol among participants is introduced, an extirpation-based key derivation algorithm (EKDA) is designed to manage the keys, a double hashed and weighted Bloom Filter (DWBF) is proposed to retrieve the encrypted keywords, which are combined with lazy revocation, multi-tree structure, asymmetric and symmetric encryptions, which form a privacypreserving, efficient and secure framework for cloud storage. The experiment and security analysis show that EKDA can reduce the communication and storage overheads efficiently, DWBF supports ciphertext retrieval and can reduce communication, storage and computation overhead as well, and the proposed framework is privacy preserving while supporting data access efficiently.


Author(s):  
Jianting Ning ◽  
Zhenfu Cao ◽  
Xiaolei Dong ◽  
Kaitai Liang ◽  
Lifei Wei ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 47144-47160 ◽  
Author(s):  
Zahid Ghaffar ◽  
Shafiq Ahmed ◽  
Khalid Mahmood ◽  
Sk Hafizul Islam ◽  
Mohammad Mehedi Hassan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document