Open Access   Article Go Back

Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review

Anjali Kumari1 , Varsha Namdeo2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-9 , Page no. 219-225, Sep-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i9.219225

Online published on Sep 30, 2019

Copyright © Anjali Kumari, Varsha Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anjali Kumari, Varsha Namdeo, “Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.219-225, 2019.

MLA Style Citation: Anjali Kumari, Varsha Namdeo "Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review." International Journal of Computer Sciences and Engineering 7.9 (2019): 219-225.

APA Style Citation: Anjali Kumari, Varsha Namdeo, (2019). Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review. International Journal of Computer Sciences and Engineering, 7(9), 219-225.

BibTex Style Citation:
@article{Kumari_2019,
author = {Anjali Kumari, Varsha Namdeo},
title = {Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {219-225},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4881},
doi = {https://doi.org/10.26438/ijcse/v7i9.219225}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.219225}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4881
TI - Privacy Preserving for Cloud Computing Using Cryptography in Big Data: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Anjali Kumari, Varsha Namdeo
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 219-225
IS - 9
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
381 321 downloads 198 downloads
  
  
           

Abstract

Now a days Cloud computing services highly demanded in all over the world due to its large size spaces for data storing. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this paper we will survey of previous author’s research that how they analyses approaches for secure data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important techniques for the security purposes. Cryptography provides various symmetric and asymmetric algorithms to secure the data.

Key-Words / Index Term

Big data, cloud computing, security, cryptography, AES etc

References

[1] Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy Preserving Public Auditing for Regenerating-Code-Based Cloud Storage”, 2015.
[2] Henry C.H. Chen and Patrick P.C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation”, 2014.
[3] Henry C.H. Chen, Yuchong Hu, Patrick P.C. Lee, and Yang Tang, “NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds”, 2014.
[4] Kan Yang, Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 2013.
[5] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage”, 2012.
[6] Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, 2010.
[7] J.He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1345–1358, 2012.
[8] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” Apr.Jun. 2012.
[9] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy preserving public auditing scheme for cloud storage”, 2013.
[10] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” Sep. 2010.
[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231–2244, Dec. 2012.
[12] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proc. IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011 .
[13] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2008, pp. 90–107.
[14] Y. Hu, H. C. H. Chen, P. P. C. Lee, and Y. Tang, “NCCloud: Applying network coding for the storage repair in a cloudof-clouds,” in Proc. USENIX FAST, 2012, p. 21.
[15] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.
[16] Mahesh U. Shankarwar and Ambika V. Pawar “Security and Privacy in Cloud Computing: A Survey”CSE Department, SIT, Symbiosis International University, Pune, India 30 January 2016.
[17]https://www.akamai.com/us/en/resources/data-security-in-cloud computing.jsp?gclid=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB&ef_id=Cj0KCQjwgezoBRDNARIsAGzEfe6UcdRWLjMBG0wtc0jx1ORor0J-O9N80kNtAyihFePqk_fTPkyMcREaAjCXEALw_wcB:G:s&utm_source=google&utm_medium=cpc
[18] Kishore Kumar"Role of Cryptography & its Related Techniques in Cloud Computing Security" International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 5 Issue VIII, August 2017- Available at www.ijraset.com
[19]https://data-flair.training/blogs/cloud-computing-applications/