Figure 3 - uploaded by Rohit Ranchal
Content may be subject to copyright.
Architecture of Existing Identity Management Systems These solutions have two characteristics, which are: 1. The use of Trusted Third Party . The major issues for adopting such approach for cloud computing are: (i) the trusted third party (it could be a cloud service located at the cloud provider) and the service provider may be the same. Therefore the trusted third party may not be an undependant-trusted entity anymore; (ii) it is a centralized approach. But if the Trusted Third Party is compromised; all the PII of its users is compromised as well. 

Architecture of Existing Identity Management Systems These solutions have two characteristics, which are: 1. The use of Trusted Third Party . The major issues for adopting such approach for cloud computing are: (i) the trusted third party (it could be a cloud service located at the cloud provider) and the service provider may be the same. Therefore the trusted third party may not be an undependant-trusted entity anymore; (ii) it is a centralized approach. But if the Trusted Third Party is compromised; all the PII of its users is compromised as well. 

Source publication
Article
Full-text available
Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. Th...

Citations

... Cloud computing is used in major areas because of high level features like convenience, scalability and saving the cost effectively [1]. Due to weak development of security model economic benefits and accessibility will be affected so the attacker construct the attack in various devices and mobile applications for the development of hypervisor and also deny the virtual machine (VM) side channel attacks and denial of service attacks (DOS) [2][3] [4]. ...
Article
Full-text available
The new and efficient method determinedly concentrates on the data processing, store and access the information which will be intended to make sure the users for legal powers should get equivalent information and also will confine the normal and unofficial legal users get admittance of the information which make suitable for those mobile cloud computing. There are various parameters with assess those execution of the active Attribute-Based encryption (ABE) method over cloud computing as takes after: cipher text measure (communication cost), private key span (storage cost), public key size (“Required storage on store public key in about powers in the ABE method”), re-keying extent (the size of the rekeying message that could make used to identify the user revocation for every attributes in the ABE system), calculation expense on the information manager (required time to encrypt the information by owner), calculation cost on the user (required run time to decrypt the information by a user). Our research work effort likewise analyses the vitality of the information security in the cloud. Purpose behind picking symmetric encryption algorithms are proficient to handle encryption and decryption to substantial measure about information and powerful speed about storing information and gaining access to those information in the cloud system.
... Active bundle approach -Active bundle [15] is middleware agent that composes sensitive data, identity data, privacy policies, integrity check metadata, access control metadata, server id, trust level threshold to access data in active bundle. Active bundle can be sent from source host to destination host. ...
Article
Full-text available
The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed that if the file size is increased, the data recovery time is also increased. The paper concludes with privacy preservation guidelines.
... structures. The shared data have a number of blocks containing the signer identity and the information are kept secret from third parties until the verification of shared information [4]. ...
Article
Full-text available
Cloud computing plays a major role in sharing data and resources to other devices through data outsourcing. During sharing resources, it is a challenging task to provide access control and secure write operations. The main issue is to provide secure read and write operations collaboratively and to reduce computational overload by effective key management. In this paper, a secure and an efficient data collaboration scheme blowfish hybridized weighted attribute-based Encryption (BH-WABE ) for secure data writing and proficient access control has been proposed. Here, weight is assigned to each attribute based on its importance and data are encrypted using access control policies. The cloud service provider stores the outsourced data and an attribute authority revokes or updates the attributes by assigning different attributes based on the weight. The receiver can access the data file corresponding to its weight in order to reduce the computational overload. The proposed BH-WABE provides collusion resistance, multiauthority security and fine-grained access control in terms of security, reliability, and efficiency. The performance is compared with the conventional hybrid attribute-based encryption (HABE) scheme in terms of data confidentiality, flexible access control, data collaboration, full delegation, partial decryption, verification, and partial signing.
... Faced with these issues, the major problem regarding privacy in cloud computing is how to secure personal data and information from being used by unauthorized users, preventing attacks against privacy such as identity theft, even when a cloud provider cannot be trusted and maintaining control over private information [4]. ...
... Privacy in cloud computing is defined as the ability of a user or a business to control what information they reveal about themselves over the cloud (or to a cloud service provider,) and the ability to control who can access that information [3]. Privacy is the ability of an individual or group to seclude themselves or information about themselves and also reveal themselves selectively [4]. Privacy is associated with the collection, use, disclosure, storage, and destruction of personal data (or Personally Identifiable Information, PII). ...
Article
Full-text available
Personal Health Record (PHR) is an evolving patient-centric model for health information exchange and for storing patients' e-record in a centralized place. It permits patients to create, manage, control and share their health information with other users. Privacy and security in cloud computing is an important concern for both public and private sector. Cloud computing has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. While it offers these resources, it likewise poses risks for privacy preservation and the level of assurance required to sustain assurance in would-be users. The challenges in privacy protection are sharing data while protecting personal information. The confidentiality of the medical records is a major problem when patients use commercial cloud servers to store their medical records. In order to assure the patients' control over their own medical records, these records/ files should be preserved with high privacy and security and be encrypted before outsourcing them. In this dissertation, we propose a framework for privacy in a PHR of a patient; the design of a privacy-preserving that enables patients to keep their health information without disclosing their sensitive information to an unauthorized third party. The PHR was designed using Apache server, MySQL as the database in conjunction with PHPMyAdmin, CSS, HTML and JavaScript. The purpose of privacy is to anticipate privacy risks prior to the development of the system and assess its impact on individuals' privacy. This helps to prevent privacy intrusion events before they occur.
Article
Full-text available
Software as a service is frequently offered in a multi-tenant style, where customers of the application and their end-users share resources such as software and hardware among all users, without necessarily sharing data. It is surprising that, with such a popular paradigm, little agreement exists with regard to the definition, domain, and challenges of multi-tenancy. This absence is detrimental to the research community and the industry, as it hampers progress in the domain of multi-tenancy and enables organizations and academics to wield their own definitions to further their commercial or research agendas.