Abstract
Security is one of the most challenging ongoing research area in cloud computing because data owner stores their sensitive data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. This paper Proposed a new algorithm PASA (Privacy-Aware Security Algorithm) for cloud environment which includes the three different security schemes to achieve the objective of maximizing the data owners control in managing the privacy mechanisms or aspects that are followed during storage, Processing and accessing of different Privacy categorized data. The Performance analysis shows that the proposed algorithm is highly Efficient, Secure and Privacy aware for cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application, 978-1-4244-7932-0/10 ©, pp. 1–6. IEEE (2010)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy- aware data storage and processing in cloud computing architecture. In: 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing, 978-0-7695-3929-4/09 ©, pp. 711–717. IEEE (2009)
Panda, S.N., Kumar, G.: IDATA – An Effective Intercept Detection Algorithm for Packet Transmission in Trust Architecture (POT-2010-0006). Selected for publication in IEEE Potentials ISSN: 0278-6648
Gleeson, E.: Computing industry set for a shocking change (April 2009), MoneyWeek, http://www.moneyweek.com/investmentadvice/computing-industryset-for-a-shocking-change
Jangra, A., Bala, R.: A Survey on various possible vulnerabilities and attacks in cloud computing environment. IJCBRÂ 3(1) (January 2012) ISSN (Online): 2229-6166
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: Proc. of ACM Cloud Computing Security Workshop 2009, pp. 55–65 (2009)
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proc. of VLDB 2007 (2007)
Gellman, R.: WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, February 23 (2009)
Pearson, S.: Taking Account of Privacy when Designing Cloud Computing Services. In: Proceedings of ICSE-Cloud 2009, Vancouver (2009)
Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. HP Labs Technical Report, HPL-2009178 (2009), http://www.hpl.hp.com/techreports/2009/HPL-2009-178.pdf
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992)
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proc. of Financial Cryptography: Workshop on Real Life Cryptographic Protocols and Standardization (2010), http://research.microsoft.com/pubs/112576/crypto-cloud.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jangra, A., Bala, R. (2013). PASA: Privacy-Aware Security Algorithm for Cloud Computing. In: Abraham, A., Thampi, S. (eds) Intelligent Informatics. Advances in Intelligent Systems and Computing, vol 182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32063-7_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-32063-7_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32062-0
Online ISBN: 978-3-642-32063-7
eBook Packages: EngineeringEngineering (R0)