Data Owner Centric Approach to Ensure Data Protection in Cloud Environment

Author(s):  
Kanupriya Dhawan ◽  
Meenakshi Sharma
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2016 ◽  
Vol 2016 ◽  
pp. 1-13
Author(s):  
Jaechun No ◽  
Sung-soon Park

As the virtual machine technology is becoming the essential component in the cloud environment, VDI is receiving explosive attentions from IT market due to its advantages of easier software management, greater data protection, and lower expenses. However, I/O overhead is the critical obstacle to achieve high system performance in VDI. Reducing I/O overhead in the virtualization environment is not an easy task, because it requires scrutinizing multiple software layers of guest-to-hypervisor and also hypervisor-to-host. In this paper, we propose multilayered cache implementation, called MultiCache, which combines the guest-level I/O optimization with the hypervisor-level I/O optimization. The main objective of the guest-level optimization is to mitigate the I/O latency between the back end, shared storage, and the guest VM by utilizing history logs of I/O activities in VM. On the other hand, the hypervisor-level I/O optimization was implemented to minimize the latency caused by the “passing I/O path to the host” and the “contenting physical I/O device among VMs” on the same host server. We executed the performance measurement of MultiCache using the postmark benchmark to verify its effectiveness.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Won-Bin Kim ◽  
Daehee Seo ◽  
Donghyun Kim ◽  
Im-Yeong Lee

In general, ID-based proxy reencryption (IBPRE) includes data transfer in a 1 : 1 manner between a sender and receiver. Therefore, only the data owner has the authority to decrypt or reencrypt the data that is encrypted with his/her public key. However, in an environment with data self-sovereignty, such as an enterprise IoT-cloud environment, the data are directly managed by cloud once data is uploaded from user-controlled IoT devices. In such a situation, there is no way of sharing data if the data owner has no access over the data due to being outside the workplace and other issues. In this study, to solve this problem, data can be shared even when the data cannot be accessed by delegating the authority of the data owner to generate the reencryption key to other users. In addition, by solving the security threats that may appear in this process, data sharing can be performed securely and efficiently in the corporate environment.


Cloud computing is an engineering discipline which is concerned with all aspect of storing and sharing useful data. Today, millions of users are able to upload and download useful information on cloud environment from anywhere at any time. Recently, many security issues are encountered in real time applications with a great loss of data and information. Subsequently, many research works have been done to highjack the security issues of cloud computing. Still, all feasible solutions may not applicable at all time and some practical situations. In this paper, we designed and implemented an ASCII based encryption technique that securely uploads, sharing the data on cloud framework with a minimum computational overhead and entropy. The proposed technique will increase the throughput of the system and it can be deployed on a cloud environment for sharing and securing useful data information


Author(s):  
Janett Powietzka ◽  
Christoph Stallmann ◽  
Enno Swart

ABSTRACT ObjectivesThe German GNC-Health Study (GNC) will have duration of at least ten years and will compile medical examinations, biomaterials and computer assisted interviews of intended 200.000 participants (funding code: 01ER1301A). For the first time, this data collection will be supplemented with a multitude of administrative and claims data such as data of statutory health insurance funds, statutory pension funds as well as the Federal Employment Agency. The GNC extends this field of research to private health insurance funds, epidemiologic and clinical cancer and mortality registers. This supplementary use of claims data is strictly regulated by legal requirements. The challenges and solutions for scientific use of such data in Germany will be described. ApproachThe Social Security Code and data protection rules govern the scientific use of administrative data. These rules include requirements for the wording of important documents such as informed consent, release from confidentiality, participants’ information, data protection concept etc. and often an authorization process by the supervisory authority of the data owner. These complex tasks, which are time consuming costly and labour intensive, are tied into the GNC-Competence Network for secondary and registry data (CNSRD). ResultsThe GNC-CNSRD has helped to formulate legal informed consent for each data source, which describes the use of the information provided by the participants, as well as the period and limitation of its retro- and prospective use. Furthermore, only the GNC-trust agency is allowed to save the social security number but not the local study center. The modular consent process and the IT- and data protection concept of the GNC is a prototype to enable the large scale use of administrative and claims data of future epidemiologic studies in Germany. ConclusionUnfortunately, one of the biggest obstacles for the scientific use of administrative and claims data still remains unsolved. The application for data use at the local supervisory authority of the data owner requires the description and limitation of the research question and the period of use of this data. This is in conflict with the modern longitudinal design of GNC because it wants to establish a research structure and data base in order to answer a variety of future and unspecified research questions. Hence, current legal requirements in Germany prevent the full utilization of the potential of administrative and claims data. Therefore, the German Federal Commissioner for Data Protection and Freedom of Information recommended an amendment to the social law.


Author(s):  
Martin Henze ◽  
René Hummen ◽  
Roman Matzutt ◽  
Daniel Catrein ◽  
Klaus Wehrle

Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing large amounts of data. Eventually, sensor networks will automatically collect such data. A particular challenge regarding sensor data in Clouds is the inherent sensitive nature of sensed information. For current Cloud platforms, the data owner loses control over her sensor data once it enters the Cloud. This imposes a major adoption barrier for bridging Cloud computing and sensor networks, which we address henceforth. After analyzing threats to sensor data in Clouds, the authors propose a Cloud architecture that enables end-to-end control over sensitive sensor data by the data owner. The authors introduce a well-defined entry point from the sensor network into the Cloud, which enforces end-to-end data protection, applies encryption and integrity protection, and grants data access. Additionally, the authors enforce strict isolation of services. The authors show the feasibility and scalability of their Cloud architecture using a prototype and measurements.


2019 ◽  
pp. 1273-1300
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Avijit Das

With the help of cloud computing Mobile Cloud Computing (MCC) overcomes the limitations of a mobile device such as security, performance and environment. But, security of the data stored in the cloud is a very challenging issue. Since the cloud cannot be fully trusted, data stored in the cloud is not fully secured. Integrity of the stored data is very important for the data owner. Therefore, it is a big problem to maintain the integrity of the data stored in the cloud environment. This chapter discusses existing schemes for data integrity in the mobile cloud environment. In this chapter a scheme has been proposed for enhancing data integrity in Mobile Cloud Environment. To make integrity checking fast the size of the data file is used. It has also been shown that how fast the integrity loss can be detected if the file size is considered. Finally, the proposed scheme is compared with some of the existing scheme.


Author(s):  
Quang Hieu Vu ◽  
Maurizio Colombo ◽  
Rasool Asal ◽  
Ali Sajjad ◽  
Fadi Ali El-Moussa ◽  
...  

Author(s):  
Kefeng Fan ◽  
Xiangzhen Yao ◽  
Xiaohe Fan ◽  
Yong Wang ◽  
Mingjie Chen

Sign in / Sign up

Export Citation Format

Share Document