Ensuring Security and Privacy Preservation for Cloud Data Services

被引:187
作者
Tang, Jun [1 ,2 ]
Cui, Yong [1 ]
Li, Qi [3 ]
Ren, Kui [4 ]
Liu, Jiangchuan [5 ]
Buyya, Rajkumar [6 ]
机构
[1] Tsinghua Univ, FIT Bldg, Beijing 100084, Peoples R China
[2] Zhengzhou Inst Informat Sci & Technol, Sci Ave, Zhengzhou 450001, Peoples R China
[3] Tsinghua Univ, Grad Sch Shenzhen, Lishui Rd, Shenzhen 518055, Peoples R China
[4] SUNY Buffalo, 317 Davis Hall, Buffalo, NY USA
[5] Simon Fraser Univ, TASC 9005, Burnaby, BC, Canada
[6] Univ Melbourne, Dept Comp & Informat Syst, Grattan St, Melbourne, Vic 3010, Australia
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Cloud computing; cloud data service; data security; privacy preservation; FULLY HOMOMORPHIC ENCRYPTION; EFFICIENT; ACCESS; SEARCH;
D O I
10.1145/2906153
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers. However, under open networks and not fully trusted cloud environments, they face enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy breach) when outsourcing their data to a public cloud or using their outsourced data. Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments. To fully understand the advances and discover the research trends of this area, this survey summarizes and analyzes the state-of-the-art protection technologies. We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies. We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access. Finally, we propose open challenges and potential research directions in each category of solutions.
引用
收藏
页数:39
相关论文
共 50 条
[21]   PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services [J].
Verginadis, Yiannis ;
Michalas, Antonis ;
Gouvas, Panagiotis ;
Schiefer, Gunther ;
Huebsch, Gerald ;
Paraskakis, Iraklis .
JOURNAL OF GRID COMPUTING, 2017, 15 (02) :219-234
[22]   Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment [J].
Monday, Happy N. ;
Li, Jian P. ;
Nneji, Grace U. ;
Ukwuoma, Chiagoziem C. ;
Agomuo, David ;
Nneji, Richard I. .
2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, :1018-1024
[23]   An Enhanced Data Owner Centric Model for Ensuring Data Security in Cloud [J].
Bajwa, Maninder Singh ;
Himani ;
Kang, Sandeep Singh .
2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, :500-503
[24]   Cloud Security Ecosystem for Data Security and Privacy [J].
Arora, Akshay ;
Khanna, Abhirup ;
Rastogi, Anmol ;
Agarwal, Amit .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, :288-292
[25]   A Metamodel for Security and Privacy Knowledge in Cloud Services [J].
Washizaki, Hironori ;
Fukumoto, Sota ;
Yamamoto, Misato ;
Kato, Takehisa ;
Ogata, Shinpei ;
Kaiya, Haruhiko ;
Fernandez, Eduardo B. ;
Kanuka, Hideyuki ;
Kondo, Yuki ;
Yoshioka, Nobukazu ;
Okubo, Takao ;
Hazeyama, Atsuo ;
Yoshizawa, Masatoshi ;
Fukazawa, Yoshiaki .
PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, :142-143
[26]   Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing [J].
Zhang, Yinghui ;
Chen, Xiaofeng ;
Li, Jin ;
Wong, Duncan S. ;
Li, Hui ;
You, Ilsun .
INFORMATION SCIENCES, 2017, 379 :42-61
[27]   Cloud Security and Privacy Model for Providing Secure Cloud Services [J].
El Makkaoui, Khalid ;
Ezzati, Abdellah ;
Beni-Hssane, Abderrahim ;
Motamed, Cina .
2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, :81-86
[28]   A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data [J].
G. Prabu Kanna ;
V. Vasudevan .
Cluster Computing, 2019, 22 :9561-9569
[29]   Data Security and Privacy Information Challenges in Cloud Computing [J].
Kong, Weiwei ;
Lei, Yang ;
Ma, Jing .
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, :512-514
[30]   An Enhanced Study on Cloud Data Services using Security Technologies [J].
Raja, J. ;
Ramakrishnan, M. .
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,