Framework modeling for User privacy in cloud computing

Many organizations around the world recognize the vitality of cloud computing. However, some concerns make organizations reluctant to adopting cloud computing. These include data security, privacy, and trust issues. It is very important that these issues are addressed to meet client concerns and to encourage the wider adoption of cloud computing. This paper develops a user privacy framework based upon on emerging security model that includes access control, encryption and protection monitor schemas in the cloud environment.

[1]  Laurence T. Yang,et al.  PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing , 2017, IEEE Transactions on Big Data.

[2]  Marin Litoiu,et al.  Partitioning applications for hybrid and federated clouds , 2012, CASCON.

[3]  Neepa K. Shah Big data and cloud computing: Pitfalls and advantages in data management , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[4]  Narasimham Challa,et al.  Advanced Persistent Threat defense system using self-destructive mechanism for Cloud Security , 2016, 2016 IEEE International Conference on Engineering and Technology (ICETECH).

[5]  Yan Yu,et al.  Resource-centric Dynamic Access Control in Cloud , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[6]  Amit Kumar Das,et al.  Q-MAC: QoS and mobility aware optimal resource allocation for dynamic application offloading in mobile cloud computing , 2017, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE).

[7]  James R. Larus The cloud will change everything , 2011, ASPLOS XVI.

[8]  L. Stein,et al.  OWL Web Ontology Language - Reference , 2004 .

[9]  Athanasios V. Vasilakos,et al.  A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..

[10]  Deborah L. McGuinness,et al.  OWL Web ontology language overview , 2004 .

[11]  Frank van Harmelen,et al.  Web Ontology Language: OWL , 2004, Handbook on Ontologies.

[12]  Edgar R. Weippl,et al.  Network-Based Secret Communication in Clouds: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[13]  Wang Shoukun,et al.  Attribute-Based Solution with Time Restriction Delegate for Flexible and Scalable Access Control in Cloud Storage , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).

[14]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[15]  Rupak Majumdar,et al.  MrCrypt: static analysis for secure cloud computations , 2013, OOPSLA.

[16]  Seema Verma,et al.  A comprehensive evaluation of cryptographic algorithms in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[17]  Rashid Sheikh,et al.  Implementation of secure authentication scheme and access control in cloud computing , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[18]  Abhaykumar Kumbhar,et al.  A Survey on Legacy and Emerging Technologies for Public Safety Communications , 2015, IEEE Communications Surveys & Tutorials.

[19]  Nikolai Tillmann,et al.  User-aware privacy control via extended static-information-flow analysis , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[20]  Wang Liangmin,et al.  Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud , 2016 .

[21]  Mauro Conti,et al.  Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[22]  S. Radhikadevi,et al.  Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption , 2016, 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).

[23]  A. Lebbat,et al.  A formal specification approach of Privacy-aware Attribute Based Access Control (Pa-ABAC) model for cloud computing , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).

[24]  Dong Hoon Lee,et al.  A study on static analysis model of mobile application for privacy protection , 2012, CSA 2012.

[25]  Meryeme Alouane,et al.  Security, privacy and trust in cloud computing: A comparative study , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[26]  Xiaoyan Sun,et al.  DAC-Mobi: Data-Assisted Communications of Mobile Images with Cloud Computing Support , 2016, IEEE Transactions on Multimedia.