Abstract
Cloud computing allows users with limited resources to farm out their data to the cloud for computation, bandwidth, storage, and services on a pay-per-use basis. Consequently, researchers worldwide are trying to address issues related to the user’s data privacy through proposing various methods such as outsourcing data in an encrypted form. However, encrypting data will conceal the relationships between data. Moreover, due to the voluminous data at the data centers, designing an efficient and reliable online-encrypted text-based searching scheme is challenging. Therefore, this paper surveys the state of the art on the data privacy preserving over the cloud through analyzing and discussing the various privacy-preserving methods that were proposed to sustain the privacy of the user’s data. The pros and cons of the surveyed approaches are drawn in comparison with each other. Finally, the results are consolidated and the issues to be addressed in the future are concluded for the advancements in cloud data privacy preserving.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Manasrah, A. M., Smadi, T., & ALmomani, A. (2016). A variable service broker routing policy for data center selection in cloud analyst. Journal of King Saud University-Computer and Information Sciences, 29(3), 365–377.
Zhang, H., et al. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. Cloud Computing, IEEE Transactions on, 99, 1–1.
Wagle, D. M. (2014). Comparative study of privacy preservation and access control of cloud data. International Journal of Engineering Research & Technology (IJERT), 3(11), 165–174.
Nabeel, M., & Bertino, E. (2014). Privacy preserving delegated access control in public clouds. Knowledge and Data Engineering, IEEE Transactions on, 26(9), 2268–2280.
AlSudiari, M. A., & Vasista, T. (2012). Cloud computing and privacy regulations: An exploratory study on issues and implications. Advanced Computing, 3(2), 159.
Seddon, J. J., & Currie, W. L. (2013). Cloud computing and trans-border health data: Unpacking US and EU healthcare regulation and compliance. Health Policy and Technology, 2(4), 229–241.
Dong, X., et al. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & Security, 42, 151–164.
Joseph, N. M., Daniel, E., & Vasanthi, N. (2013). Survey on privacy-preserving methods for storage in cloud computing. In: Amrita International Conference of Women in Computing.
Jogade, S., Sharma, R., & Kadam, R. (2014). Partitioning data and domain integrity checking for storage-improving cloud storage security using data partitioning technique. International Journal of Emerging Research in Management & Technology, 3(3), 133–137.
Chen, F., & Liu, A. X. (2014). Privacy and integrity preserving multi-dimensional range queries for cloud computing. In Networking Conference, 2014 IFIP. IEEE.
Ku, W.-S., et al. (2013). A query integrity assurance scheme for accessing outsourced spatial databases. GeoInformatica, 17(1), 97–124.
Hu, L., et al. (2013). Spatial query integrity with Voronoi neighbors. Knowledge and Data Engineering, IEEE Transactions on, 25(4), 863–876.
Naruchitparames, J., & Güneş, M. H. (2011). Enhancing data privacy and integrity in the cloud. In High Performance Computing and Simulation (HPCS), 2011 International Conference on. IEEE.
Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings 2000 IEEE Symposium on. IEEE.
Goh, E.-J. (2003). Secure indexes for efficient searching on encrypted compressed data (Technical report 2003/216, Cryptology ePrint archive, 2003). http://eprint.iacr.org/2003/216
Chang, Y.-C., & Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data. In Applied cryptography and network security. Berlin: Springer.
Curtmola, R., et al. (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM.
Chase, M., & Kamara, S. (2010). Structured encryption and controlled disclosure. In Advances in cryptology-ASIACRYPT 2010 (pp. 577–594). Berlin: Springer.
van Liesdonk, P., et al. (2010). Computationally efficient searchable symmetric encryption. In Secure data management (pp. 87–100). Berlin: Springer.
Kurosawa, K., & Ohtaki, Y. (2012). UC-secure searchable symmetric encryption. In Financial cryptography and data security (pp. 285–298). Berlin: Springer.
Canetti, R. (2001). Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE.
Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM.
Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption. In Financial cryptography and data security (pp. 258–274). Berlin: Springer.
Li, J., et al. (2010). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE. IEEE.
Adjedj, M., et al. (2009). Biometric identification over encrypted data made feasible. In Information systems security (pp. 86–100). Berlin: Springer.
Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE.
Wang, J., et al. (2012). A new efficient verifiable fuzzy keyword search scheme. JoWUA, 3(4), 61–71.
Lu, Y. (2012). Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS.
Boneh, D., et al. (2004). Public key encryption with keyword search. In Advances in cryptology-Eurocrypt 2004. Berlin: Springer.
Bellare, M., Boldyreva, A., & O’Neill, A. (2007). Deterministic and efficiently searchable encryption. In Advances in cryptology-CRYPTO 2007 (pp. 535–552). Berlin: Springer.
Shi, E., et al. (2007). Multi-dimensional range query over encrypted data. In SP’07, IEEE Symposium on. IEEE.
Liu, Q., Wang, G., & Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE’09. International Conference on. IEEE.
Liu, Q., Wang, G., & Wu, J. (2012). Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications, 35(3), 927–933.
Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in cryptology–EUROCRYPT 2008 (pp. 146–162). Berlin: Springer.
Attrapadung, N., & Libert, B. (2010). Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In Public key cryptography–PKC 2010 (pp. 384–402). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Manasrah, A.M., Shannaq, M.A., Nasir, M.A. (2020). An Investigation Study of Privacy Preserving in Cloud Computing Environment. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)