Skip to main content

An Investigation Study of Privacy Preserving in Cloud Computing Environment

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

Cloud computing allows users with limited resources to farm out their data to the cloud for computation, bandwidth, storage, and services on a pay-per-use basis. Consequently, researchers worldwide are trying to address issues related to the user’s data privacy through proposing various methods such as outsourcing data in an encrypted form. However, encrypting data will conceal the relationships between data. Moreover, due to the voluminous data at the data centers, designing an efficient and reliable online-encrypted text-based searching scheme is challenging. Therefore, this paper surveys the state of the art on the data privacy preserving over the cloud through analyzing and discussing the various privacy-preserving methods that were proposed to sustain the privacy of the user’s data. The pros and cons of the surveyed approaches are drawn in comparison with each other. Finally, the results are consolidated and the issues to be addressed in the future are concluded for the advancements in cloud data privacy preserving.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Manasrah, A. M., Smadi, T., & ALmomani, A. (2016). A variable service broker routing policy for data center selection in cloud analyst. Journal of King Saud University-Computer and Information Sciences, 29(3), 365–377.

    Article  Google Scholar 

  2. Zhang, H., et al. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. Cloud Computing, IEEE Transactions on, 99, 1–1.

    Article  Google Scholar 

  3. Wagle, D. M. (2014). Comparative study of privacy preservation and access control of cloud data. International Journal of Engineering Research & Technology (IJERT), 3(11), 165–174.

    Google Scholar 

  4. Nabeel, M., & Bertino, E. (2014). Privacy preserving delegated access control in public clouds. Knowledge and Data Engineering, IEEE Transactions on, 26(9), 2268–2280.

    Article  Google Scholar 

  5. AlSudiari, M. A., & Vasista, T. (2012). Cloud computing and privacy regulations: An exploratory study on issues and implications. Advanced Computing, 3(2), 159.

    Google Scholar 

  6. Seddon, J. J., & Currie, W. L. (2013). Cloud computing and trans-border health data: Unpacking US and EU healthcare regulation and compliance. Health Policy and Technology, 2(4), 229–241.

    Article  Google Scholar 

  7. Dong, X., et al. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & Security, 42, 151–164.

    Article  Google Scholar 

  8. Joseph, N. M., Daniel, E., & Vasanthi, N. (2013). Survey on privacy-preserving methods for storage in cloud computing. In: Amrita International Conference of Women in Computing.

    Google Scholar 

  9. Jogade, S., Sharma, R., & Kadam, R. (2014). Partitioning data and domain integrity checking for storage-improving cloud storage security using data partitioning technique. International Journal of Emerging Research in Management & Technology, 3(3), 133–137.

    Google Scholar 

  10. Chen, F., & Liu, A. X. (2014). Privacy and integrity preserving multi-dimensional range queries for cloud computing. In Networking Conference, 2014 IFIP. IEEE.

    Google Scholar 

  11. Ku, W.-S., et al. (2013). A query integrity assurance scheme for accessing outsourced spatial databases. GeoInformatica, 17(1), 97–124.

    Article  Google Scholar 

  12. Hu, L., et al. (2013). Spatial query integrity with Voronoi neighbors. Knowledge and Data Engineering, IEEE Transactions on, 25(4), 863–876.

    Article  Google Scholar 

  13. Naruchitparames, J., & Güneş, M. H. (2011). Enhancing data privacy and integrity in the cloud. In High Performance Computing and Simulation (HPCS), 2011 International Conference on. IEEE.

    Google Scholar 

  14. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings 2000 IEEE Symposium on. IEEE.

    Google Scholar 

  15. Goh, E.-J. (2003). Secure indexes for efficient searching on encrypted compressed data (Technical report 2003/216, Cryptology ePrint archive, 2003). http://eprint.iacr.org/2003/216

  16. Chang, Y.-C., & Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data. In Applied cryptography and network security. Berlin: Springer.

    Google Scholar 

  17. Curtmola, R., et al. (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM.

    Google Scholar 

  18. Chase, M., & Kamara, S. (2010). Structured encryption and controlled disclosure. In Advances in cryptology-ASIACRYPT 2010 (pp. 577–594). Berlin: Springer.

    Chapter  Google Scholar 

  19. van Liesdonk, P., et al. (2010). Computationally efficient searchable symmetric encryption. In Secure data management (pp. 87–100). Berlin: Springer.

    Chapter  Google Scholar 

  20. Kurosawa, K., & Ohtaki, Y. (2012). UC-secure searchable symmetric encryption. In Financial cryptography and data security (pp. 285–298). Berlin: Springer.

    Chapter  Google Scholar 

  21. Canetti, R. (2001). Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE.

    Google Scholar 

  22. Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM.

    Google Scholar 

  23. Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption. In Financial cryptography and data security (pp. 258–274). Berlin: Springer.

    Chapter  Google Scholar 

  24. Li, J., et al. (2010). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE. IEEE.

    Google Scholar 

  25. Adjedj, M., et al. (2009). Biometric identification over encrypted data made feasible. In Information systems security (pp. 86–100). Berlin: Springer.

    Chapter  Google Scholar 

  26. Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE.

    Google Scholar 

  27. Wang, J., et al. (2012). A new efficient verifiable fuzzy keyword search scheme. JoWUA, 3(4), 61–71.

    Google Scholar 

  28. Lu, Y. (2012). Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS.

    Google Scholar 

  29. Boneh, D., et al. (2004). Public key encryption with keyword search. In Advances in cryptology-Eurocrypt 2004. Berlin: Springer.

    Google Scholar 

  30. Bellare, M., Boldyreva, A., & O’Neill, A. (2007). Deterministic and efficiently searchable encryption. In Advances in cryptology-CRYPTO 2007 (pp. 535–552). Berlin: Springer.

    Chapter  Google Scholar 

  31. Shi, E., et al. (2007). Multi-dimensional range query over encrypted data. In SP’07, IEEE Symposium on. IEEE.

    Google Scholar 

  32. Liu, Q., Wang, G., & Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE’09. International Conference on. IEEE.

    Google Scholar 

  33. Liu, Q., Wang, G., & Wu, J. (2012). Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications, 35(3), 927–933.

    Article  Google Scholar 

  34. Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in cryptology–EUROCRYPT 2008 (pp. 146–162). Berlin: Springer.

    Chapter  Google Scholar 

  35. Attrapadung, N., & Libert, B. (2010). Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In Public key cryptography–PKC 2010 (pp. 384–402). Berlin: Springer.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed M. Manasrah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Manasrah, A.M., Shannaq, M.A., Nasir, M.A. (2020). An Investigation Study of Privacy Preserving in Cloud Computing Environment. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics