JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 83-89.doi: 10.6040/j.issn.1671-9352.2.2014.262

Previous Articles     Next Articles

Research of data privacy protection for cloud computing

CAI Hong-yun, TIAN Jun-feng   

  1. College of Mathematics and Computer, Hebei University, Baoding 071002, Hebei, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: Cloud computing is a fundamental change happening in the field of information technology. It can improve the efficiency and reduce the cost, while it also brings great challenges in the field of data security. Among these challenges, how to protect data privacy for cloud consumers has been a key problem. In this paper, the reasons that could cause privacy risk were analyzed, and the key issues of privacy protection for cloud computing were proposed, then the mainstream technologies and present situation were reviewed and summarized, final the problems which existed in the present were discussed and prospects for some future research directions were analyzed.

Key words: privacy protection, privacy risk, cloud computing

CLC Number: 

  • TP393
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011, 22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.
[2] ALMULLA S A,CHAN Y Y.Cloud computing security management[C]//Proceedings of the 2nd International Conference on Engineering System Management and Applications (ICESMA 2010). Piscataway: IEEE, 2010:1-7.
[3] HUANG Ruwei, GUI Xiaolin, YU Si, et al. Study of privacy-preserving framework for cloud storage[J]. Computer Science and Information Systems, 2011, 8(3): 801-819.
[4] 中国公共云发展现状[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687e21af45a9b7.html. The development status of Chinese public cloud[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687-e21af45a9b7.html.
[5] RISTENPART T,TROMER E,SHACHAM H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: Springer Press, 2009:199-212.
[6] VIKTOR M S, KENNETH C. Big data:a revolution that will transform how we live,work and think[M]. Boston: Houghton Mifflin Harcourt, 2013.
[7] HASSAN T, JAMES B D, GAIL J A. Security and privacy challenges in cloud computing environments[J].IEEE Security & Privacy, 2010, 8(6):24-31.
[8] PEARSON S.Taking account of privacy when designing cloud computing services[C]. Proceedings of the Workshop on Software Engineering Challenges of Cloud Computing. Washington: IEEE Computer Society, 2009:44-52.
[9] KAMARA S, LAUTER K.Cryptographic cloud storage [J]. Lecture Notes in Computer Science, 2010, 6054:136-149.
[10] LI Min, ZANG Wanyu, BAI Kun, et al.MyCloud-supporting user-configured privacy protection in cloud computing[C]//Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC 2013).[S.l.]:[s.n.], 2013:59-68.
[11] RAY C, GANGULY U. An approach for data privacy in hybrid cloud environment[C]//Proceedings of the 2nd International Conference on Computer and Communication Technology (ICCCT 2011). Piscataway: IEEE, 2011:316-320.
[12] CHUANG I H,LI S H,HUANG K C, et al. An effective privacy protection scheme for cloud computing[C]//Proceedings of the 13th International Conference on Advanced Communication Technology (ICACT 2011). Piscataway: IEEE, 2011:260-265.
[13] ITANI W, KAYSSI A, CHEHAB A. Privacy as a service: privacy-aware data storage and processing in cloud computing architectures[C]//Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09). Los Alamitos: IEEE Computer Society, 2009:711-716.
[14] 徐小龙,周静岚,杨庚.一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013, 40(2):98-102. XU Xiaolong, ZHOU Jinglan, YANG Geng. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013, 40(2):98-102.
[15] LIN Dan, SQUICCIARINI A. Data protection models for service provisioning in the cloud[C]//Proceedings of the 15th ACM Symposium on Access Control Models and Technologies(SACMAT 2010). New York: ACM Press, 2010:183-192.
[16] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of 2009 ACM Symposium on Theory of Computing (STOC'09). New York: ACM Press, 2009:169-178.
[17] SADEGHI A R, SCHNEIDER T, WINANDY M.Token-based cloud computing secure outsourcing of data and arbitrary computations with lower latency [J]. Lecture Notes in Computer Science, 2010, 6101:417-429.
[18] WANG Cong, WANG Qian, REN Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9.
[19] NAEHRIG M,LAUTER K,VAIKUNTANATHAN V.Can homomorphic encryption be practical?[C]//Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. New York: ACM Press, 2011:113-124.
[20] 光焱,祝跃飞,顾纯祥,等.一种针对全同态加密体制的密钥恢复攻击[J].电子与信息学报,2013, 35(12):2999-3004. GUANG Yan, ZHU Yuefei, GU Chunxiang, et al. A key recovery attack on fully homomorphism encryption scheme[J]. Journal of Electronics & Information Technology, 2013, 35(12):2999-3004.
[21] PEARSON S,SHEN Y,MOWBRAY M.A privacy manager for cloud computing [J]. Cloud Computing, 2009, 5931:90-106.
[22] MOWBRAY M, PEARSON S. A client-based privacy manager for cloud computing[C]//Proceedings of the 4th International ICST Conference on Communication System Software and Middle-ware. [S.l.]:[s.n.], 2009: 1-8.
[23] LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]//Proceedings IEEE INFOCOM. New York: IEEE, 2010: 1-5.
[24] CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233.
[25] 黄汝维,桂小林,余思,等.支持隐私保护的云存储框架设计[J].西安交通大学学报,2011, 45(10):1-6, 12. HUANG Ruwei, GUI Xiaolin, YU Si, et al. Design of cloud storage framework with privacy-preserving[J]. Journal of Xi'an Jiaotong University, 2011, 45(10):1-6, 12.
[26] 程芳权,彭智勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012, 35(11):2215-2227. CHENG Fangquan, PENG Zhiyong, SONG Wei, et al. An efficient privacy-preserving rank query over encrypted data in cloud computing[J]. Chinese Journal of Computers, 2012, 35(11):2215-2227.
[27] CHEN Chih-Yung, TU Jih-Fu. A novel cloud computing algorithm of security and privacy [J]. Mathematical Problems in Engineering, 2013: 871430.1-871430.6.
[28] YU Shucheng, WANG Cong, REN Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9.
[29] 孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011, 32(7):146-152. SUN Guozi, DONG Yu, LI Yun. CP-ABE based data access control for cloud storage [J]. Journal on Communications, 2011, 32(7): 146-152.
[30] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011, 32(7):125-132. HONG Cheng, ZHANG Min, FENG Dengguo. Achieving efficient dynamic cryptographic access control in cloud storage[J]. Journal on Communications, 2011, 32(7):125-132.
[31] 杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011, 32(7):169-175. YANG Liu, TANG Zhuo, LI Renfa, et al. Roles query algorithm in cloud computing environment based on user require[J]. Journal on Communications, 2011, 32(7):169-175.
[32] 黄勤龙,马兆丰,傅镜艺,等.云计算环境中支持隐私保护的数字版权保护方案[J].通信学报,2014, 35(2):95-103. HUANG Qinlong, MA Zhaofeng, FU Jingyi, et al. Privacy-preserving digital rights management scheme in cloud computing [J]. Journal on Communications, 2014, 35(2):95-103.
[33] 陈海波.云计算平台可信性增强技术的研究 [D]. 上海:复旦大学,2008. CHEN Haibo. Improving the dependability of cloud computing systems [D].Shanghai: Fudan University, 2008.
[34] 张逢喆,陈进,陈海波,等.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011, 48(7):1155-1167. ZHANG Fengzhe, CHEN Jin, CHEN Haibo, et al. Lifetime privacy and self-Destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011, 48(7):1155-1167.
[35] PATEL A, DANSENA P. TPM as a middleware for enterprise data security [J]. International Journal of Computer Science and Mobile Computing, 2013, 2(7):327-332.
[36] 张坤.面向多租户应用的云数据隐私保护机制研究[D].济南:山东大学,2012. ZHANG Kun. Research on cloud data privacy preservation mechanism for multi-tenancy applications[D]. Jinan: Shandong University, 2012.
[37] BERTINO E, PACI F, FERRINI R, et al. Privacy-preserving digital identity management for cloud computing[C].IEEE Computer Society Data Engineering Bulletin,2009, 32(1):1-4.
[38] HWANG M, KWAK J. Improved user-centric ID management model for privacy protection in cloud computing [J]. International Journal of Computer and Network Security, 2010, 2(8):45-49.
[39] JUNG Taeho, LI Xiangyang, WAN Zhiguo, et al. Privacy preserving cloud data access with multi-authorities[C]//Proceedings of 2013 IEEE INFOCOM. New York: IEEE, 2013: 2625-2633.
[40] LI X H, HE J S, ZHANG T. A service-oriented identity authentication privacy protection method in cloud computing[J]. International Journal of Grid and Distributed Computing, 2013, 6(1):77-86.
[41] TALAL H N, QUAN Z S, ABDULLAH A. Identifying fake feedback for effective trust management in cloud environments[J]. Lecture Notes in Computer Science, 2013, 7759:47-58.
[42] WAYNE J, TIMOTHY G. Guidelines on security and privacy in public cloud computing[EB/OL].[2014-07-10]. http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf.
[43] PATEL P, AJITH R, AMIT S. Service level agreement in cloud computing [EB/OL].[2014-07-10]. http://knoesis.wright.edu/library/download/OOPSLA-cloud-wsla-v3.pdf.
[44] Rabia Latif, Haider Abbasside Assar. Cloud computing risk assessment: a systematic literature review[J].Lecture Notes in Electrical Engineering,2014,276:285-295.
[45] THEOHARIDOU M, PAPANIKOLAOU N, PEARSON S, et al. Privacy risk, security, accountability in the cloud[C]// Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013). Los Alamitos: IEEE Computer Society, 2013: 177-184.
[46] MARIANTHI T, NIKOLAOS T, DIMITRIS G. In cloud we trust: risk-assessment-as-a-service[J].Trust Management VII IFIP Advances in Information and Communication Technology, 2013, 401:100-110.
[47] 赵波,严飞,张立强,等.可信云计算环境的构建[J].中国计算机学会通讯,2012,8(7):28-34. ZHAO Bo, YAN Fei, ZHANG Liqiang, et al. Construction of trusted cloud computing environment [J]. Communications of the CCF, 2012, 8(7):28-34.
[1] KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29.
[2] WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37.
[3] HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53.
[4] HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75.
[5] BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84.
[6] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[7] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[8] . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67.
[9] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[10] LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91.
[11] CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97.
[12] LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117.
[13] ZHAO Ze-mao1, LI Lin1, ZHANG Fan1,2, ZHANG Pin1, ZHOU Jian-qin1, WANG Jia-bo1. The location privacy protection method with dispersed sub cloaking region [J]. J4, 2013, 48(7): 56-61.
[14] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
[15] . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!