Analysing Security and Privacy Management For Cloud Computing Environment

被引:6
|
作者
Gourkhede, Manish H. [1 ]
Theng, Deepti P. [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT) | 2014年
关键词
Digital rights management; cloud computing; privacy; security; Trusted Third Party;
D O I
10.1109/CSNT.2014.142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Right Management (DRM) is a system for protecting the digital rights of the copyrighted data which is widely distributed through the internet or other means of digital media by permitting secure distribution and preventing from illegal distribution of the copyrighted data. Cloud computing is an emerging technology where a huge amount of data is stored from all around the world, from different countries and Organizations. Thus it is important to secure and protect the confidentiality of this data and also to preserve the privacy of the user who is using this technology, so that no one can reveal their personnel information and identity even their own Cloud Service Provider (CSP). In This Paper a comparative analysis of the various schemes is presented, most of them rely on a Trusted Third Party (TTP), but even the TTP can be malicious. To overcome the drawbacks an enhanced scheme is proposed which preserve both the digital rights of the content and privacy of the user without relying on TTP. Comparative analysis shows that proposed scheme is better than other techniques which are mentioned in this paper & suitable for upcoming Cloud based Systems.
引用
收藏
页码:677 / 680
页数:4
相关论文
共 50 条
  • [21] Blockchain Technology for Addressing Privacy and Security Issues in Cloud Computing
    Tehrani, Pardis Moslemzadeh
    Kotsis, Gabriele
    Pranata, Andasmara Rizky
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 194 - 200
  • [22] Privacy, Security and Trust in Cloud Computing The Perspective of the Telecommunication Industry
    Martucci, Leonardo A.
    Zuccato, Albin
    Smeets, Ben
    Habib, Sheikh M.
    Johansson, Thomas
    Shahmehri, Nahid
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 627 - 632
  • [23] PASA: Privacy-Aware Security Algorithm for Cloud Computing
    Jangra, Ajay
    Bala, Renu
    INTELLIGENT INFORMATICS, 2013, 182 : 487 - 497
  • [24] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [25] Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey
    Hosseinzadeh, Shohreh
    Hyrynsalmi, Sami
    Conti, Mauro
    Leppanen, Ville
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 529 - 535
  • [26] An exploration of security and privacy among cloud computing
    Chen, Chih-Yung
    Tu, Jih-Fu
    INNOVATION, COMMUNICATION AND ENGINEERING, 2014, : 219 - 222
  • [27] Cloud Computing Privacy & Security Global Issues, Challenges, & Mechanisms
    Lar, Saleem-ullah
    Liao, Xiaofeng
    Abbas, Syed Ali
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1240 - 1245
  • [28] Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
    Sahmim, Syrine
    Gharsellaoui, Hamza
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 1516 - 1522
  • [29] Research on Security and Privacy of Big Data under Cloud Computing Environment
    Zhang Maohong
    Yang Aihua
    Liu Hui
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON BIG DATA RESEARCH (ICBDR 2018), 2018, : 52 - 55
  • [30] A Study on the Virtualization Security Management in the Cloud Computing Environment
    Cheong, Il-Ahn
    Lee, Seulgi
    Son, Kyungho
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2035 - 2039