Abstract
Cloud is an ironic solution of the ultimate globalization which is a bunch of dedicated servers, networking elements such as software and hardware networked with the internet. Cloud computing enables the user to utilize the applications, storage solutions, and resources, likewise it also authorizes the data access, data management, and connectivity. All the activities of the cloud infrastructure seem to be transparent to ensure it without any notion of the locale to its user. The rising technology aids to deliver on-demand web access speedily to the computing resources. Cloud user can access and release the computing resources with minimum management effort and least interaction with cloud service provider. A consolidated cloud service i.e., hybrid cloud renders a federation, bridge, secure encrypted connection, information placement decision between the public and private cloud and utilizes the services of the two clouds those are security, availability, and cost effectiveness. Though cloud computing services have bags of inherent benefits, there are likelihood risks in privacy and security heeding’s that should be thought over before collecting, processing, sharing or storing enterprise or individual’s data in the cloud. This survey paper explores the contemporary techniques and methods to furnish a trustworthy and foolproof cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Trans. IEEE Parallel Distrib. Syst. 22(5), 847–859 (2011)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Ghogare, S., Pawar, A., Dani, A.: Revam** optimal cloud storage system. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 457–463. Springer India (2016)
Pawar, A.V., Dani, A.A.: Design of privacy model for storing files on cloud storage. J. Theor. Appl. Inf. Technol. 67(2), (2014)
Yao, X.: Anonymous credential-based access control scheme for clouds. Cloud Comput. IEEE J. Mag. 2, pp. 34–43, (2015)
Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. Netw. IEEE 24(4), 19–24 (2010)
Lord N.: Cryptography in the Cloud: Securing Cloud Data with Encryption. Retrieved from https://digitalguardian.com/blog/cryptography-cloud-securing-cloud-data-encryption 28 Sept 2015
Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)
Ningning, S., Zhiguo, S., Yan, S., **anwei, Z.: Multi-matrix combined public key based on big data system key management scheme (2014)
Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467–479 (2014)
Zhang, H., Jiang, G., Yoshihira, K., Chen, H.: Proactive workload management in hybrid cloud computing. IEEE Trans. Netw. Serv. Manage. 11(1), 90–100 (2014)
Lu, P., Sun, Q., Wu, K., Zhu, Z.: Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Trans. Multimedia, 17, 1297–1308 (2015)
Jiang, D., Tung, A.K., Chen, G.: Map-join-reduce: toward scalable and efficient data analysis on large clusters. IEEE Transactions Knowl. Data Eng. 23(9), 1299–1311 (2011)
Dahiphale, D., Karve, R., Vasilakos, A.V., Liu, H., Yu, Z., Chhajer, A., Wang, C.: An advanced mapreduce: cloud mapreduce, enhancements and applications. IEEE Trans. Netw. Serv. Manage. 1, 101–115 (2014)
Ouedraogo, M., Mignon, S., Cholez, H., Furnell, S., Dubois, E.: Security transparency: the next frontier for security research in the cloud. J. Cloud Comput. 4(1), 1–14 (2015)
Salam, M.I., Yau, W.C., Chin, J.J., Heng, S.H., Ling, H.C., Phan, R.C., Yap, W.S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(1), 1–16 (2015)
Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. 2(1), 1–14 (2013)
Liu, X., Wang, X., Matwin, S., Japkowicz, N.: Meta-MapReduce for scalable data mining. J. Big Data 2(1), 1–21 (2015)
Senk, C.: Adoption of security as a service. J. Internet Serv. Appl. 4(1), 1–16 (2013)
Kaviani, N., Wohlstadter, E., Lea, R.: Partitioning of web applications for hybrid cloud deployment. J. Internet Serv. Appl. 5(1), 1–17 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mote, R., Pawar, A., Dani, A. (2016). Review of Security and Privacy Techniques in Cloud Computing Environment. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_54
Download citation
DOI: https://doi.org/10.1007/978-3-319-30933-0_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30932-3
Online ISBN: 978-3-319-30933-0
eBook Packages: EngineeringEngineering (R0)