3.8 Article

A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Journal

BAGHDAD SCIENCE JOURNAL
Volume 19, Issue 6, Pages 1572-1580

Publisher

COLL SCIENCE WOMEN, UNIV BAGHDAD
DOI: 10.21123/bsj.2022.7077

Keywords

Encryption; Cloud Computing; CP-ABE based encryption; Privacy; Security

Ask authors/readers for more resources

Cloud computing plays a prominent role in our day-to-day lives, offering robustness, cost-effectiveness, and pervasive nature. However, ensuring data security and privacy remains a challenge. This paper proposes a method that utilizes order-preserving symmetric encryption (OPES) to track malicious users and protect system security.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses orderpreserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available