PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION

Authors

  • Banoth Anantharam Research Scholar, Department of Computer Science and Engineering, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, M.P, India Author
  • Narendra Sharma Department of Computer Science and Engineering, School of Engineering, Sri Satya Sai University of Technology &Medical Sciences, Sehore, M.P, India Author
  • B. Kavitha Rani Department of Computer Science and Engineering, CMR Technical Campus, Hyderabad, Telangana, India Author

Keywords:

Cloud Computing, Privacy, Security, Cryptography And Homomorphic Encryption

Abstract

As the next generation of computing technology, as per customer demand and requirements, cloud computing offers the flexibility to dynamically add new resources and services. An increasing number of people and organizations are now able to shift their services to the cloud due to the rapidly evolving technology that supports cloud computing. Even though cloud computing is making rapid progress, security continues to be a major barrier to adoption. The adoption of cloud computing is seen as having been affected by the constant problem of data security. Challenges with data privacy, integrity, and trust are among the serious security concerns that are directing the wide adoption of cloud computing. One of the best ways to protect cloud storage is through cryptography. The problems of data integrity, privacy, and trust must be considered, and a number of algorithms and protocols have been created and are currently utilized. However, they are ineffective. Hence, to develop an effective cloud storage system, privacy-preserving cloud computing for data storage security frameworks using regenerating Homomorphic encryption is presented. Utilizing homomorphic encryption, data is transformed into ciphertext so that it can be studied and utilized in its original state. Encryption and decryption are the primary focus of this framework, which provides cloud users with data security assurance. An effective policy enforcement mechanism, a context-aware security model, encryption, and query middleware are all part of this framework. This framework will significantly improve the privacy of cloud data.

References

Danish Ahamad, Shabi Alam Hameed, Mobin Akhtar, “A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization”, Journal of King Saud University-Computer and Information Sciences 34 (2022) 2343–2358, doi: 10.1016/j.jksuci.2020.10.015

P. Kavitha Rani, S. Sathiya, S. Sureshkumar, B.Arun Kumar, “Enhancing Cloud Security with Hybrid Encryption”, 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC),DOI: 10.1109/ICAAIC53929.2022.9793254

Shaan Ishfar Ann Shaan, Masba Uddin Rumi Rumi, Anik Dutta Anik, Md. Rubayet Hasan Rubayet, Md Alauddin Mazumder Alauddin, “Cloud Computing and Security in Virtualization Platform”, Research Square, 2022, DOI:10.21203/rs.3.rs-2340881/v1

Prachee Atmapoojya, Utkarsh Saini, Rohit Patidar, Rishabh Gupta, Ashutosh Kumar Singh, “Differential Privacy based Preserving Data on Cloud Environment”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, IJERTV10IS050356, Vol. 10 Issue 05, May-2021

Sanjeev Kumar, Garima Karnani, Madhu Sharma Gaur, Anju Mishra, “Cloud Security using Hybrid Cryptography Algorithms”, 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), DOI: 10.1109/ICIEM51511.2021.9445377

Aparna Manikonda, Nalini N, “Fine Grained Security in Cloud with Cryptographic Access Control”, 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACTTE), DOI: 10.1109/ICACITE51222.2021.9404685

Amr M. Sauber, Passent M. El-Kafrawy, Amr F. Shawish , Mohamed A. Amin, and Ismail M. Hagag, “A New Secure Model for Data Protection over Cloud Computing”, Hindawi Computational Intelligence and Neuroscience, Volume 2021, Article ID 8113253, 11 pages, doi:10.1155/2021/8113253

Heping Pu, Yijun Wang, Xinke An, “Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology”, Journal of Computer and Communications, 2020, 8, 45-58, DOI: 10.4236/jcc.2020.88005

Mustafa S. Abbas, Suadad S. Mahdi, Shahad A. Hussien, “Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography”, 2020 International Conference on Computer Science and Software Engineering (CSASE),DOI: 10.1109/CSASE48920.2020.9142072

Mohamed Ben Haj Frej, Julius Dichter, Navarun Gupta, “Light-weight Accountable Privacy Preserving (LAPP) Protocol to Determine Dishonest Role of Third Party Auditor in Cloud Auditing”, 2018 IEEE International Conference on Consumer Electronics (ICCE), 978-1-5386-3025-9/18

Amit R. Gadekar, Dr. M. V. Sarode, and Dr. V. M. Thakare, “Design and Implementation of Secure Multi-Cloud Storage Mechanism”, International Journal of Research in Engineering, IT and Social Sciences, ISSN 2250-0588, Impact Factor: 6.565, Volume 08 Issue 08, August 2018, Page 178-184

Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald H¨ubsch, Iraklis Paraskakis, “PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services”, J Grid Computing (2017) 15:219–234, DOI 10.1007/s10723-017-9394-2

Jayashree Agarkhed, Ashalatha R, “A Privacy Preservation Scheme in Cloud Environment”, 2017 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB17), 2017, 978-1-5090-5434-3

Jiajia Miao, Aihua Bao, Yanjie Niu, Zhizhong Liu, Handong Mao, “A secure private cloud storage system based on virtual isolation mechanism”, 2016 IEEE International Conference on Big Data Analysis (ICBDA), DOI: 10.1109/ICBDA.2016.7509831

Chandramohan Dhasarathan, Vengattaraman Thirumal, Dhavachelvan Ponnurangam, “A secure data privacy preservation for on-demand cloud service”, Journal of King Saud University – Engineering Sciences (2016), doi: 10.1016/j.jksues.2015.12.002

Anjali DV, Dr. S.N Chandrashekara, “Design and Implementation of Secure Cloud Storage System using Hybrid Cryptography Algorithms with Role based Access Control Model”, International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869 (O) 2454-4698 (P), Volume-5, Issue-1, May 2016

Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain,Salah H. Abbdal1, Deqing Zou1, “Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor”, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT 2015), 978-1-4673-8173-4/15

Aayushi Priya, Y.K. Rana, B.P. Patel, “Design and Implementation of an Algorithm to Enhance Cloud Security”, International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 12, March 2015

Apurva R. Pisalkar, M. V. Bramhe, “Design and Implementation of Techniques for Secure Virtualization in Cloud Environment”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 3 Issue 7, July - 2014

Stéphane Betgé-Brezetz, Guy-Bertrand Kamga, Marie-Pascale Dupont, Aoues Guesmi, “Privacy Control in Cloud VM File Systems”, 2013 IEEE International Conference on Cloud Computing Technology and Science, 978-0-7695-5095-4/13, 2013 IEEE, DOI 10.1109/CloudCom.2013.147.

Downloads

Published

2024-02-27