Skip to main content

PASA: Privacy-Aware Security Algorithm for Cloud Computing

  • Conference paper
Intelligent Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 182))

Abstract

Security is one of the most challenging ongoing research area in cloud computing because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. This paper Proposed a new algorithm PASA (Privacy-Aware Security Algorithm) for cloud environment which includes the three different security schemes to achieve the objective of maximizing the data owners control in managing the privacy mechanisms or aspects that are followed during storage, Processing and accessing of different Privacy categorized data. The Performance analysis shows that the proposed algorithm is highly Efficient, Secure and Privacy aware for cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 978-1-4244-7932-0/10 ©, pp. 1–6. IEEE (2010)

    Google Scholar 

  2. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy- aware data storage and processing in cloud computing architecture. In: 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing, 978-0-7695-3929-4/09 ©, pp. 711–717. IEEE (2009)

    Google Scholar 

  3. Panda, S.N., Kumar, G.: IDATA – An Effective Intercept Detection Algorithm for Packet Transmission in Trust Architecture (POT-2010-0006). Selected for publication in IEEE Potentials ISSN: 0278-6648

    Google Scholar 

  4. Gleeson, E.: Computing industry set for a shocking change (April 2009), MoneyWeek, http://www.moneyweek.com/investmentadvice/computing-industryset-for-a-shocking-change

  5. Jangra, A., Bala, R.: A Survey on various possible vulnerabilities and attacks in cloud computing environment. IJCBR 3(1) (January 2012) ISSN (Online): 2229-6166

    Google Scholar 

  6. Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: Proc. of ACM Cloud Computing Security Workshop 2009, pp. 55–65 (2009)

    Google Scholar 

  7. di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007 (2007)

    Google Scholar 

  8. Gellman, R.: WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23 (2009)

    Google Scholar 

  9. Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: Proceedings of ICSE-Cloud 2009, Vancouver (2009)

    Google Scholar 

  10. Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. HP Labs Technical Report, HPL-2009178 (2009), http://www.hpl.hp.com/techreports/2009/HPL-2009-178.pdf

  11. Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992)

    Article  Google Scholar 

  12. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proc. of Financial Cryptography: Workshop on Real Life Cryptographic Protocols and Standardization (2010), http://research.microsoft.com/pubs/112576/crypto-cloud.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay Jangra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jangra, A., Bala, R. (2013). PASA: Privacy-Aware Security Algorithm for Cloud Computing. In: Abraham, A., Thampi, S. (eds) Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32063-7_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32063-7_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32062-0

  • Online ISBN: 978-3-642-32063-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics