Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions

被引:51
作者
Sun, Pan Jun [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
关键词
Cloud computing; privacy; access control; attribute-based encryption; trust; ATTRIBUTE-BASED ENCRYPTION; PROXY RE-ENCRYPTION; DATA ACCESS-CONTROL; KEYWORD RANKED SEARCH; TRUST MANAGEMENT; CONTROL SYSTEM; REPUTATION; CIPHERTEXT; EFFICIENT; POLICY;
D O I
10.1109/ACCESS.2019.2946185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified logic. In this paper, we systematically review and analyze relevant research achievements. First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multi-authority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable encryption(SE), trust, reputation, extension of tradition access control and hierarchical key; third, we propose the research challenge and future direction of the privacy protection in the cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies.
引用
收藏
页码:147420 / 147452
页数:33
相关论文
共 198 条
[1]  
Adjedj M, 2009, LECT NOTES COMPUT SC, V5905, P86, DOI 10.1007/978-3-642-10772-6_8
[2]  
Ahmad W., 2018, IEEE Access, V6, p46 363
[3]   Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing [J].
Ahmad, Waqas ;
Wang, Shengling ;
Ullah, Ata ;
Sheharyar ;
Mahmood, Zahid .
IEEE ACCESS, 2018, 6 :46363-46381
[4]   Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges [J].
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Ab Hamid, Siti Hafizah ;
Gani, Abdullah ;
Khan, Suleman ;
Khan, Muhammad Khurram .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145
[5]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[6]  
Aluvalu RajaniKanth., 2015, Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume, V1, P653
[7]  
[Anonymous], 2015, P 2015 INT C FUT COM
[8]  
[Anonymous], CLUSTER COMPUT
[9]  
[Anonymous], INT J ENG SCI INNOV
[10]  
[Anonymous], IACR CRYPTOLOGY EPRI