Network Security & Cryptography (NSC) Lab

Department of Information Technology
Indian Institute of Information Technology, Allahabad.


Cloud Computing/Social Network Security

Privacy and Integrity Protection in Cloud Computing/Social Network

Cloud computing is the emerging worldwide technology to mitigate the burden of the users by providing different types of services. But the data owner will ask that, when my data is on my server there is no need to worry about that when it is in some other location, how do I know it is protected in case of privacy and also integrity? [1]. This is the question which makes researchers to concentrate in the privacy and the integrity issues of the cloud computing when it comes to storage as a service. Bardin [2] has listed the following reasons why the privacy (and also integrity) is a major issue in cloud computing.

  1. Multi-location of the private data.
  2. Multi-location of the service provider.
  3. Data Combination and Commingling.
  4. Data transfer across the borders.
  5. Restrictions on techniques and logistics.

Pearson [3] has given the following parameters to consider when designing the cloud to overcome the security and privacy issues:

  1. Minimizing customer personal information sent to and stored in the computing cloud.
  2. Protecting sensitive customers information in the cloud.
  3. Maximizing user control.
  4. Allowing user choice.
  5. Specifying and limiting the purpose of data usage.
  6. Providing the customer with privacy feedback.

Even though various parameters are given, most of the existing models given only the policy and guidelines to the users and the service providers but there is no efficient technical solution for preserving the privacy of the data in the remote location storage. Apart from the privacy, integrity is also an important aspect to be considered in the remote storage. Hence the efficient and effective model is required to preserve the privacy and integrity of the data stored on the third party server. Also, the most important objective is to identify the malicious person in the environment.

References
[1] Lance Whitney , 'Air Force taps IBM for secure cloud', http://news.cnet.com/8301-1009_3-1447483-83.html. February, 2004.
[2] J.Bardin, 'Security Guidance for Critical areas of focus in Cloud Computing', www.cloudsecurityalliance.org/guidance/csaguide.pdf, 2009.
[3] Pearson, 'Taking Account of Privacy when Designing Cloud Computing Services', Proceedings of ICSE- Cloud'09, 2009.



Collaborators : Having similar interest can join.


Sponsors : No sponsors yet.


Contributions :

Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.