Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 50))

Abstract

Cloud is an ironic solution of the ultimate globalization which is a bunch of dedicated servers, networking elements such as software and hardware networked with the internet. Cloud computing enables the user to utilize the applications, storage solutions, and resources, likewise it also authorizes the data access, data management, and connectivity. All the activities of the cloud infrastructure seem to be transparent to ensure it without any notion of the locale to its user. The rising technology aids to deliver on-demand web access speedily to the computing resources. Cloud user can access and release the computing resources with minimum management effort and least interaction with cloud service provider. A consolidated cloud service i.e., hybrid cloud renders a federation, bridge, secure encrypted connection, information placement decision between the public and private cloud and utilizes the services of the two clouds those are security, availability, and cost effectiveness. Though cloud computing services have bags of inherent benefits, there are likelihood risks in privacy and security heeding’s that should be thought over before collecting, processing, sharing or storing enterprise or individual’s data in the cloud. This survey paper explores the contemporary techniques and methods to furnish a trustworthy and foolproof cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Trans. IEEE Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  2. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  3. Ghogare, S., Pawar, A., Dani, A.: Revam** optimal cloud storage system. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 457–463. Springer India (2016)

    Google Scholar 

  4. Pawar, A.V., Dani, A.A.: Design of privacy model for storing files on cloud storage. J. Theor. Appl. Inf. Technol. 67(2), (2014)

    Google Scholar 

  5. Yao, X.: Anonymous credential-based access control scheme for clouds. Cloud Comput. IEEE J. Mag. 2, pp. 34–43, (2015)

    Google Scholar 

  6. Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. Netw. IEEE 24(4), 19–24 (2010)

    Article  Google Scholar 

  7. Lord N.: Cryptography in the Cloud: Securing Cloud Data with Encryption. Retrieved from https://digitalguardian.com/blog/cryptography-cloud-securing-cloud-data-encryption 28 Sept 2015

  8. Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)

    Article  Google Scholar 

  9. Ningning, S., Zhiguo, S., Yan, S., **anwei, Z.: Multi-matrix combined public key based on big data system key management scheme (2014)

    Google Scholar 

  10. Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467–479 (2014)

    Article  Google Scholar 

  11. Zhang, H., Jiang, G., Yoshihira, K., Chen, H.: Proactive workload management in hybrid cloud computing. IEEE Trans. Netw. Serv. Manage. 11(1), 90–100 (2014)

    Article  Google Scholar 

  12. Lu, P., Sun, Q., Wu, K., Zhu, Z.: Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Trans. Multimedia, 17, 1297–1308 (2015)

    Google Scholar 

  13. Jiang, D., Tung, A.K., Chen, G.: Map-join-reduce: toward scalable and efficient data analysis on large clusters. IEEE Transactions Knowl. Data Eng. 23(9), 1299–1311 (2011)

    Article  Google Scholar 

  14. Dahiphale, D., Karve, R., Vasilakos, A.V., Liu, H., Yu, Z., Chhajer, A., Wang, C.: An advanced mapreduce: cloud mapreduce, enhancements and applications. IEEE Trans. Netw. Serv. Manage. 1, 101–115 (2014)

    Article  Google Scholar 

  15. Ouedraogo, M., Mignon, S., Cholez, H., Furnell, S., Dubois, E.: Security transparency: the next frontier for security research in the cloud. J. Cloud Comput. 4(1), 1–14 (2015)

    Article  Google Scholar 

  16. Salam, M.I., Yau, W.C., Chin, J.J., Heng, S.H., Ling, H.C., Phan, R.C., Yap, W.S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum.-Centric Comput. Inf. Sci. 5(1), 1–16 (2015)

    Article  Google Scholar 

  17. Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. 2(1), 1–14 (2013)

    Article  Google Scholar 

  18. Liu, X., Wang, X., Matwin, S., Japkowicz, N.: Meta-MapReduce for scalable data mining. J. Big Data 2(1), 1–21 (2015)

    Article  Google Scholar 

  19. Senk, C.: Adoption of security as a service. J. Internet Serv. Appl. 4(1), 1–16 (2013)

    Article  Google Scholar 

  20. Kaviani, N., Wohlstadter, E., Lea, R.: Partitioning of web applications for hybrid cloud deployment. J. Internet Serv. Appl. 5(1), 1–17 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rutuja Mote .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mote, R., Pawar, A., Dani, A. (2016). Review of Security and Privacy Techniques in Cloud Computing Environment. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30933-0_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30932-3

  • Online ISBN: 978-3-319-30933-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation