Analysing Security and Privacy Management For Cloud Computing Environment

被引:6
|
作者
Gourkhede, Manish H. [1 ]
Theng, Deepti P. [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT) | 2014年
关键词
Digital rights management; cloud computing; privacy; security; Trusted Third Party;
D O I
10.1109/CSNT.2014.142
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digital Right Management (DRM) is a system for protecting the digital rights of the copyrighted data which is widely distributed through the internet or other means of digital media by permitting secure distribution and preventing from illegal distribution of the copyrighted data. Cloud computing is an emerging technology where a huge amount of data is stored from all around the world, from different countries and Organizations. Thus it is important to secure and protect the confidentiality of this data and also to preserve the privacy of the user who is using this technology, so that no one can reveal their personnel information and identity even their own Cloud Service Provider (CSP). In This Paper a comparative analysis of the various schemes is presented, most of them rely on a Trusted Third Party (TTP), but even the TTP can be malicious. To overcome the drawbacks an enhanced scheme is proposed which preserve both the digital rights of the content and privacy of the user without relying on TTP. Comparative analysis shows that proposed scheme is better than other techniques which are mentioned in this paper & suitable for upcoming Cloud based Systems.
引用
收藏
页码:677 / 680
页数:4
相关论文
共 50 条
  • [41] An effective cloud computing model enhancing privacy in cloud computing
    Chawki, Mohamed
    INFORMATION SECURITY JOURNAL, 2024, 33 (06): : 635 - 658
  • [42] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [43] On Current Trends in Security and Privacy of Cloud Computing
    Sahin, Serap
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 171 - 175
  • [44] Survey on Interoperability, Security, Trust, Privacy Standardization of Cloud Computing
    Saravanakumar, C.
    Arun, C.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 977 - 982
  • [45] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [46] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186
  • [47] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [48] An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    Singh, Noopur
    Linderman, Mark
    Ben Othmane, Lotfi
    Lilien, Leszek
    2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 177 - 183
  • [49] Privacy preserving steganography based biometric authentication system for cloud computing environment
    Prabhu D.
    Vijay Bhanu S.
    Suthir S.
    Measurement: Sensors, 2022, 24
  • [50] SECURITY RISK MANAGEMENT - CLOUD ENVIRONMENT
    Zboril, Martin
    STRATEGIC MODELING IN MANAGEMENT, ECONOMY AND SOCIETY (IDIMT-2018), 2018, 47 : 367 - 374