Data Classification for Achieving Security in Cloud Computing

Abstract Data is the valuable asset and of great concerns when moving towards the cloud. Data privacy and security is the active area of research and experimentations in cloud computing. Data leakage and privacy protection is becoming crucial for many organizations moving on to cloud. Data can be of various types and degree of protection required for all the data is also varies. Here we are proposing a classification technique that defines various parameters. Parameters are defined based on various dimensions. Data security can be provided based on the level and the required protection. Corresponding security provisions at the storage can be applied based on data set classified as per the dimensions. The efficiency of the proposed classification scheme is analyzed with the sample dataset collected.

[1]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[2]  Andreas Klein,et al.  A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[3]  Wei Cheng,et al.  Characterizing privacy leakage of public WiFi networks for users on travel , 2013, 2013 Proceedings IEEE INFOCOM.

[4]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[5]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[6]  Jaehong Park,et al.  Preserving user privacy from third-party applications in online social networks , 2013, WWW.

[7]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[8]  M. Sasikumar,et al.  Security Issues in Cloud Computing: A survey , 2012 .

[9]  Paulo Muniz de Ávila,et al.  Taxonomy for Privacy Policies of Social Networks Sites , 2013 .

[10]  Bruce Schneier,et al.  A Taxonomy of Social Networking Data , 2010, IEEE Security & Privacy.

[11]  A Min Tjoa,et al.  Retaining Data Control to the Client in Infrastructure Clouds , 2009, 2009 International Conference on Availability, Reliability and Security.