Cloud Computing Privacy Issues and User-Centric Solution

Recently, the most announced word in the world of computation is ‘Cloud Computing’. In cloud computing, the services are provided by some vendors and the customers are unaware about the storage and maintenance of their data. So, logically speaking, the client has no control over the cloud. When the service providers process the data being provided by the customers, issues like privacy loss and data leakage may arise. This is an important barrier for the adoption of cloud services. A user-centric approach is essential to overcome this barrier. In this paper we present a solution which provides the control, over the data being submitted in the cloud, to the user.

[1]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[2]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[3]  Daniele Sgandurra,et al.  Cloud security is not (just) virtualization security: a short paper , 2009, CCSW '09.

[4]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.

[5]  Daniele Sgandurra,et al.  Cloud Security Is Not (Just) Virtualization Security , 2009 .

[6]  Hiroyuki Sato,et al.  A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[7]  Dawn Song,et al.  Proceedings of the 2009 ACM workshop on Cloud computing security , 2009, CloudCom 2009.

[8]  Willem-Jan van den Heuvel,et al.  Best practices in cloud computing: designing for the cloud , 2009, OOPSLA Companion.

[9]  Margo I. Seltzer,et al.  Provenance: a future history , 2009, OOPSLA Companion.

[10]  Ashutosh Saxena,et al.  A cryptography based privacy preserving solution to mine cloud data , 2010, Bangalore Compute Conf..

[11]  Dan Lin,et al.  Data protection models for service provisioning in the cloud , 2010, SACMAT '10.

[12]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[13]  Sascha Ossowski,et al.  Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010 , 2010, SAC.

[14]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[15]  Xuezeng Pan,et al.  Use trust management module to achieve effective security mechanisms in cloud environment , 2010, 2010 International Conference on Electronics and Information Engineering.

[16]  Shouhuai Xu,et al.  Proceedings of the 3rd ACM workshop on Scalable trusted computing , 2008, CCS 2008.

[17]  Jan Bosch,et al.  Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE , 2009, COMSWARE 2009.

[18]  Ting Yu,et al.  Towards secure dataflow processing in open distributed systems , 2009, STC '09.

[19]  Zhang Yang,et al.  Security Scheme for Sensitive Data in Management-Type SaaS , 2009, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering.

[20]  Roberto Di Pietro,et al.  Transparent security for cloud , 2010, SAC '10.

[21]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[22]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[23]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.