An Enhanced Study on Cloud Data Services using Security Technologies

被引:0
作者
Raja, J. [1 ]
Ramakrishnan, M. [2 ]
机构
[1] Sathyabama Univ, Comp sci & Engn, Chennai, Tamil Nadu, India
[2] Madurai Kamarajar Univ, Dept Informat & Technol, Madurai, Tamil Nadu, India
来源
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2) | 2017年
关键词
Cloud computing; security threats; privacy preservation; cloud data services; FULLY HOMOMORPHIC ENCRYPTION; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the greatest growing field for outsourcing data to cloud server. Among the rapid invention in cloud computing technologies, providing data services to the industry people, enterprises and individual in the cloud environment is a serious issue. Implementing security techniques in the cloud server is very complex task due to tremendous growth in cloud environment. These cloud servers are hosted on internet to perform operation such as read, write, store and organize the data rather than on desktop computer. While processing the data on cloud server under open network, business people faces massive security and privacy risks. The majority of the threat includes data leakage, data corruption and privacy preservation in cloud environments. In recent times, several studies have been proposed to addresses these threats and also provide solutions to enable the protection on the cloud data. In this paper, we present the enhanced study on cloud data services also we discuss the security threats and its requirements to outsource the data to a cloud server. Finally, we present the open challenges and current research directions in each category of solution to the data services.
引用
收藏
页数:5
相关论文
共 22 条
[1]  
[Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-29860-8
[2]  
[Anonymous], FORECAST CONSUMER DI
[3]  
[Anonymous], P WPES
[4]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[5]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]  
De Capitani di Vimercati S., 2010, Proceedings 2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), P42, DOI 10.1109/ICDCSW.2010.35
[7]  
Di Vimercati S.D.C., 2014, SECURE CLOUD COMPUTI, P123
[8]   Encryption Policies for Regulating Access to Outsourced Data [J].
di Vimercati, Sabrina De Capitani ;
Foresti, Sara ;
Jajodia, Sushil ;
Paraboschi, Stefano ;
Samarati, Pierangela .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2010, 35 (02)
[9]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[10]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418