Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Preserving and Data Security Using Anonymous Cloud and RSA

P. Kharat, A. Buchade

Abstract


Cloud technology is one of big IT solution provider. It provides number of and variety of services using high computation techniques. User gets benefit of this by simply pay as you go. But while getting this benefit there is a threat of revealing the identity and loss of important data while processing. Depending on the user’s need both things are highly important. So to overcome all these security issues we propose a system for secure cloud service provider which keeps owner information only for login and billing purpose, computation is done by anonymous cloud. Communication between user and cloud server is secure with RSA encrypted data with token. This token is forward for computation and to return result to cloud and then to user. Computation is done by number of slave nodes selected by calculating load of computation. For our practical experiment we created an anonymous cloud on private cloud and uploaded diabetes data file to analyze it for positive and negative diabetes test result.

Keywords


Cloud Computing, Data Ownership, Privacy, Security.

Full Text:

PDF

References


. A. Jeeva, Dr.C. Selvan, A. Anitha, “Secure Token Based Storage System toPreserve the Sensitive Data Using ProxyRe-Encryption Technique”, International Journal of Computer Science and Mobile Computing.

. R. Buyya1, Chee Shin Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud Computing and Emerging IT Platforms:Vision, Hype, and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009.

. Y. Lindell, B. Pinkas, ”Secure Multiparty Computation for Privacy-Preserving Data Mining”, Journal of Privacy and Confidentiality, vol. 1, no. 1, pp. 59–98, 2009.

. N. Hopper, E. Y. Vasserman, and E. Chan-Tin, “How much anonymity does network latency leak?” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 2, 2010

. R. Huang, X. Gui, S. Yu, and W. Zhuang, “Research on privacy-preserving cloud storage framework supporting ciphertext retrieval,” in Proceedings of the International Conference on Network Computing and Information Security (NCIS), 2011, pp. 93–97.

. Q. Liu, G. Wang, and J. Wu, “Secure and privacy preserving keyword searching for cloud storage services,” Journal of Network and Compute

. Cynthia C. Dwork, “Differential privacy: A survey of results,” in Proceedings of the 5th International Conference on Theory and Applications of Models of Computation (TAMC), 2008, pp. 1–19.

. P. Samarati, “Protecting respondents’ identities in microdata release,” IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 13, no. 6, pp. 1010–1027, 2001.

. R. Laurikainen, “Secure and anonymous communication in the cloud,” Aalto University School of Science and Technology, Department of Computer Science and Engineering, Tech. Rep. TKK-CSE-B10, 2010.

. D. Chaum, “Security without identification: Transaction systems to make big brother obsolete,” Communications of the ACM (CACM), vol. 28, no. 10, pp. 1030–1044, 1985.

. S. Zarandioon, D. Yao, and V. Ganapathy, “K2C: Cryptographic cloud storage with lazy revocation and anonymous access,” in Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 2011, pp. 491–510.

. S. M. Khan and K. W. Hamlen, “Computation certification as a service in the cloud,” in Proc. IEEE/ACM Int. Sym. Cluster, Cloud and Grid Computing (CCGrid), 2013, pp. 434–441.

. E. Bertino, F. Paci and R. Ferrini, ” Privacy Preserving Digital Identity Management for Cloud Computing”, IEEE Data Eng. Bull., 2009 - 131.107.65.22 .

. C. wang, Q Wang, K. Ren and W. Lou, “Privacy –Preserving Public Auditing for Data Storage Security in Cloud Computing” INFOCOM, 2010 Proceedings IEEE, dated 14-15 March 2010, pp 1-9.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.