Privacy-Preserving Techniques for Secure Cloud Computing : A Survey of Recent Advances

Authors

  • N. Savitha  Department of Computer Science and Engineering, Chaintanya Deemed to be University, Warangal, Telangana, India
  • Dr. E. Sai Kiran  Department of Computer Science and Engineering, Chaintanya Deemed to be University, Warangal, Telangana, India

DOI:

https://doi.org/10.32628/IJSRST523103129

Keywords:

Privacy-preserving techniques, Secure cloud computing, federated learning, homomorphic encryption, secure multi-party computation, and differential privacy.

Abstract

Cloud computing has gained immense popularity in recent years due to its on-demand and scalable computing resources. However, with the growth of cloud computing, privacy and security concerns have also increased. The primary concern is how to ensure the confidentiality and integrity of data in the cloud, as the data is stored on third-party servers. To address these concerns, various privacy-preserving techniques have been proposed, which allow users to store and process their data in the cloud without compromising privacy and security. We provide a thorough overview of current developments in privacy-preserving methods for safe cloud computing in this study. We start by giving a general review of cloud computing and the security issues it presents. Then, we go over a variety of privacy-preserving methods, such as differential privacy, homomorphic encryption, secure outsourcing, and secure multi-party computation. We also highlight their advantages and limitations. Finally, we conclude with some future research directions in privacy-preserving cloud computing.

References

  1. A. Juels and R. L. Rivest, “Honey encryption: security beyond the brute-force bound,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 59–79, 2014.
  2. A. Kamara and A. Lauter, "Cryptographic Cloud Storage," in Financial Cryptography and Data Security, 2010, pp. 136-149.
  3. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial Intelligence and Statistics, pp. 1273–1282, 2017.
  4. C. C. Aggarwal, “Data privacy in the information age,” Springer, 2015.
  5. C. Dwork, “Differential privacy,” in Automata, Languages and Programming, Springer, pp. 1–12, 2006.
  6. C. Gentry and S. Halevi, “Implementing Gentry’s fully-homomorphic encryption scheme,” in Advances in Cryptology - CRYPTO 2011, Springer, pp. 129–148, 2011.
  7. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," in ACM Symposium on Theory of Computing, 2009, pp. 169-178.
  8. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," in IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 2, pp. 222-233, 2012.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2012.
  10. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  11. H. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," in INFOCOM, 2010, pp. 1-9.
  12. H. Wang, C. C. Aggarwal, and P. S. Yu, "Privacy-Preserving Data Mining: A Survey," in Privacy-Preserving Data Mining: Models and Algorithms, 2008, pp. 11-52.
  13. He, D., Kumar, N., Li, J., & Zhang, Y. (2018). Privacy-preserving techniques in cloud computing: Current trends and future directions. IEEE Access, 6, 5168-5185.
  14. Huang, Z., Zhang, R., & Chen, Z. (2017). Privacy-preserving cloud computing: Advances and challenges. Future Generation Computer Systems, 75, 323-329.
  15. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
  16. J. Liu, R. Lu, Z. Wu, and X. Lin, "Toward Fine-Grained Access Control in the Cloud: Preserving Attribute Privacy and Achieving Efficient Collusion Detection," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1737-1746, 2014.
  17. K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," in IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  18. K. Ren, W. Lou, and Y. Zhang, "RACS: A Case for Cloud Storage Diversity," in IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 6, pp. 337-349, 2013.
  19. Kaur, R., & Kumar, N. (2019). Privacy preserving techniques in cloud computing: A comprehensive review. International Journal of Computer Science and Information Security, 17(6), 240-244.
  20. Kumar, N., & Chhabra, J. (2019). A survey on privacy-preserving techniques in cloud computing. IETE Technical Review, 36(2), 146-159.
  21. L. Xiong, J. Ma, L. Yang, X. Li, and X. Xiao, "Efficient Privacy-Preserving Collaborative Filtering with Improved Data Confidentiality," in IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 8, pp. 1850-1863, 2013.
  22. Li, Q., & Zhu, Y. (2018). Privacy-preserving techniques for secure cloud computing: a survey of recent advances. IEEE Access, 6, 21976-21992.
  23. M. Armbrust et al., "Above the Clouds: A Berkeley View of Cloud Computing," in Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
  24. M. Kantarcioglu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," in IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026-1037, 2004.
  25. M. Li, S. Yu, K. Ren, and W. Lou, "Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings," in INFOCOM, 2010, pp. 1-9.
  26. Q. Wang, C. Wang, K. Ren, N. Cao, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in IEEE INFOCOM, 2010, pp. 1-9.
  27. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing," in INFOCOM, 2010, pp. 1-9.
  28. Rahman, M. S., Islam, M. M., & Hossain, M. A. (2019). Privacy-preserving techniques for cloud computing: Review and future directions. Future Generation Computer Systems, 92, 223-244.
  29. S. Kamara and K. Lauter, "Cryptographic Cloud Storage" in Financial Cryptography and Data Security ser. Lecture Notes in Computer Science., Berlin Heidelberg:Springer, vol. 6054, pp. 136-149, 2010.
  30. S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing, Springer, pp. 3–42, 2013.
  31. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," in IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  32. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute Based Data Sharing with Attribute Revocation," in ASIACCS, 2010, pp. 261-270.
  33. Shang, X., Wang, F., Li, X., & Wan, J. (2017). Privacy-preserving techniques in cloud computing: A systematic literature review. Journal of Network and Computer Applications, 93, 44-57.
  34. Sun, L., Wang, S., Wang, R., Liu, Z., & Cao, J. (2018). A survey of privacy-preserving techniques in cloud computing. Security and Communication Networks, 2018.
  35. X. Liu, Y. Zhang, L. Chen, and J. Bu, "MProtect: Towards Privacy-Preserving Machine Learning in the Cloud," in IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 2, pp. 340-353, 2018.
  36. Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” Journal of Privacy and Confidentiality, vol. 1, no. 1, pp. 59–98, 2009.
  37. Yang, L., & Jia, W. (2020). A comprehensive survey on privacy-preserving techniques in cloud computing. Cluster Computing, 23(3), 2065-2086.
  38. Zhang, J., & Zhang, Y. (2016). Privacy-preserving cloud computing: State of the art and future directions. Journal of Internet Technology, 17(5), 751-760.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
N. Savitha, Dr. E. Sai Kiran "Privacy-Preserving Techniques for Secure Cloud Computing : A Survey of Recent Advances" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 3, pp.736-742, May-June-2023. Available at doi : https://doi.org/10.32628/IJSRST523103129