ARTICLE
TITLE

Layer-based Privacy and Security Architecture for Cloud Data Sharing

SUMMARY

The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to the client, we propose a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categorization requires different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity; public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layered approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.

 Articles related

Somnath B. Thigale,Rahul K. Pandey,Prakash R Gadekar,Virendrakumar A. Dhotre,Aparna A. Junnarkar    

For IoT enabled networks, the security and privacy is one of the important research challenge due to open nature of wireless communications, especially for the networks like Vehicular Ad hoc Networks (VANETs). The characteristics like heterogeneity, cons... see more


Boubakeur Annane,Osman Ghazali    

The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing i... see more


Basma Badawi Hathout,Samy Ghoniemy,Osman Ibrahim    

In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of s... see more


Sergio Amadeu Silveira,Rodolfo Avelino,Joyce Souza    

RESUMO O artigo apresenta a estrutura e a dinâmica do mercado de dados pessoais. Mostra a dimensão econômica do dado pessoal para a economia da informação. Apresenta as quatro camadas do mercado de dados: a coleta e armazenamento de informações; o p... see more

Revista: Liinc em Revista

Pierpaolo Loreti, Lorenzo Bracciale and Alberto Caponi    

Popular mobile apps use push notifications extensively to offer an “always connected” experience to their users. Social networking apps use them as a real-time channel to notify users about new private messages or new social interactions (e.g., friendshi... see more

Revista: Future Internet