ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Future Trends of Cloud Computing Security: An Extensive Investigation

R.S.Venkatesh1, P.K.Reejeesh2, Prof.S.Balamurugan3, S.Charanyaa4
  1. Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India1,2,3
  2. Senior Software Engineer Mainframe Technologies Former, Larsen & Tubro (L&T) Infotech, Chennai, TamilNadu, India4
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

This paper reviews methods to be developed for anonymizing data in cloud from 2015 to 2014 . Publishing microdata such as census or patient data for extensive research and other purposes is an important problem area being focused by government agencies and other social associations. The traditional approach identified through literature survey reveals that the approach of eliminating uniquely identifying fields such as social security number from microdata, still results in disclosure of sensitive data, k-anonymization optimization algorithm ,seems to be promising and powerful in certain cases ,still carrying the restrictions that optimized k-anonymity are NP-hard, thereby leading to severe computational challenges. k-anonimity faces the problem of homogeneity attack and background knowledge attack . The notion of l-diversity proposed in the literature to address this issue also poses a number of constraints , as it proved to be inefficient to prevent attribute disclosure (skewness attack and similarity attack), ldiversity is difficult to achieve and may not provide sufficient privacy protection against sensitive attribute across equivalence class can substantially improve the privacy as against information disclosure limitation techniques such as sampling cell suppression rounding and data swapping and pertubertation. This paper aims to discuss efficient anonymization approach that requires partitioning of microdata equivalence classes and by minimizing closeness by kernel smoothing and determining ether move distances by controlling the distribution pattern of sensitive attribute in a microdata and also maintaining diversity.

Keywords

Data Anonymization, Microdata, k-anonymity, Identity Disclosure, Attribute Disclosure, Diversity

I. INTRODUCTION

Need for publishing sensitive data to public has grown extravagantly during recent years. Though publishing demands its need there is a restriction that published social network data should not disclose private information of individuals. Hence protecting privacy of individuals and ensuring utility of social networ data as well becomes a challenging and interesting research topic. Considering a graphical model [35] where the vertex indicates a sensitive label algorithms could be developed to publish the non-tabular data without compromising privacy of individuals. Though the data is represented in graphical model after KDLD sequence generation [35] the data is susceptible to several attacks such as homogeneity attack, background knowledge attack, similarity attacks and many more. In this paper we have made an investigation on the attacks and possible solutions proposed in literature and efficiency of the same.

II. CLOUD COMPUTING

Cloud computing is a platform that provides services to deliver information management and software through network of servers at much cheaper rate. Although concept of cloud computing is like a new phenomenon, it was originally found in early 1960’s. The cloud platform is emerging to the greater extent and has been successful in recent years.
The background of cloud is a representation of development and maintenance of IT services used and paid for it.
Cloud computing has reduced the costs of computing and has allowed various firms to deliver their computed results to its clients. This concept is gaining more advancement since it will encourage more innovations and will reduce the cost of maintenance and will be pulling the users as per their needs.
So it is broadly classified into SaaS, PaaS,IaaS. During the implementation of cloud in firms, two main questions are to be answered:
1.Where are you now?
2.Where do you want to go?
Since planning of a process require the transfer of cloud computing will follow it. If the questions are answered, we can easily complete it and deliver the service. An advantageous point in cloud computing is that most of the applications will be readily available and only the understanding of the system is important. Cloud computing provides new opportunities to perform same job in a traditional IT manner, Which gives complete satisfaction to the end user.
Important of all is the security in the cloud applications which are to be efficiently managed. Due to rapid development I the field of cloud computing, internet is widely used and it has been affected the most and cloud computing is a massive sufferer.
Business must pay more attention towards cloud security due to multi tenant nature of a cloud platform. The main point is about encryption of data and they should ensure security built in, authentication and layered security. Since security breaches can affect reputation of a company.
There are many more security issues surrounding the concept of cloud computing and hence encryption of data is must before uploading into public cloud.
2015(A)
The most powerful technological tool which is used to perform tedious task and complex computation is cloud computing. Cloud computing reduces the use of expensive hardware maintenance, apace and also software. In recent years cloud computing has created a big growth in the name of data or big data. The authors through this paper reviews about the rise of big data in the field of cloud computing. They have introduced about the concepts of cloud computing with detailed explanations in this paper. The authors have also discussed about the technologies involving the relationship between big data, cloud computing and hadoop. On the whole, the authors have provided a detailed explanation of the research issues of cloud computing. The importance of cloud computing has changes the literal meaning of information technology. The model proposal for big data in this paper has been compared with the several other cloud platforms. They have also presented a MapReduce project and its related software through thus paper.
2015(B)
The authors through this paper discusses about the definition of big data, its important challenges faced in the process of storage, analyzing, maintenance, recovery and retrieval of big data and also the role played by the cloud computing architecture in the above mentioned issue. The authors have also presented the importance of cloud computing system for the handling of various business models in big data. They have reviewed about the various concepts namely resource pool sharing, scalability, resource shrink ability and other system of cloud computing. Authors have also explained about the cloud architecture and how big data changes to a smaller data through cloud computing tools and also discusses on the issues in order to become an important solution to handle big data.
2015(C)
As we all know cloud computing is a platform that provides the computation of data for storing and retrieval of the user data. Cloud computing, security has been implemented using various techniques since cloud security is one of the important factor. Even the security is ensured using the RSA,DES,AES and ECC. The other constraints of cloud computing are data privacy and data protection. A tool for data security is cryptography. The important fact of cryptography is encryption of data. The authors proposes various security techniques, cryptographic algorithms in order to address data preservation, privacy and protection. The authors conclude that the protected cloud computing system depends upon security results that work in parallel. Also security calculation of information is necessary which preserves the privacy of information.

III. EFFECT OF CLOUD COMPUTING SYSTEM IN TERMS OF SERVICES QUALITY OF KNOWLEDGE MANAGEMENT SYSTEM

In recent years, information system has a very important role in every organizations. At the same time handling these system needs knowledge management system which is increasing to a great extent on the other hand, cloud computing has created a big impact in the field of processing the authors through this paper have tried to find the rate of QOS based on cloud computing.
Technologies have been improvised day by day and they play an important role in today’s world. Since, it solves problems at low cost. These technologies implement most of the important concepts of IT. One such is cloud computing which is a safe, secure framework which is affordable for the users.
Social networks and cloud computing are two important platforms which are used to setup the knowledge based management system. The knowledge management system can increase the system utility, quality, work and thereby using knowledge cycle. Thus this system needs a platform to display the services where cloud computing technology is used.
As per Dewn and Mclean model, information system model contains six factors to identify its success namely system quality, information quality, service quality, sm usage, user satisfaction, net benefit among which is addressing a system on the whole if an information system is identified and measured using all these six factors, that system is said to be a successful one.
As per the definition, cloud computing is a technology where an external firm runs the application and stores their results other than running it on system locally. The main aim of this research is to use a cloud server to check the QOS of a knowledge management system.
Thus the paper explains the success of implementing a KMS based on cloud technology and it can satisfy users in terms of QOS and thereby they observed drastic differences after its implementation.
2016(B)
The authors through this paper say that in the world of the development of software, work splitting and its proper allocation are the main factors that are to be considered in order to maximize the GSD and also to meet the challenges. In this paper, they have proposed a mathematical model which is designed in order to decrease the cost, time and load balancing in the field of software development. The authors have used a technique called multi-level clustering so as to reduce the communication cost. Initial cluster is done for work partition and secondary cluster is done at the time of allocation of the divided work. The model has been implemented using MATLAB. Since the cost is the most important factor in GSD, the proposal considers the static load sharing schema for work allocation. Thus the authors focuses on two important attributes namely Execution cost and Intercommunication task that are related to tasks and sites.

IV. A FRAMEWORK FOR CLOUD BASED SMART HOME

Cloud computing has become an important concept and has reached to people of all ages due to its ability to provide cloud services from business to entertainment. Through this research work, the author proposes a framework in order to provide cloud based smart home by addressing threat and security issues by securing data as well as device elasticity.
During the past years, cloud computing has been emerging to a greater extent by providing software, data access and services such as IaaS, PaaS and SaaS enabling users to use at low cost. This is generally pay as per use technology. One of the important characteristics of cloud computing is virtualization where the virtual machine is made to run on physical machine that allows users to run applications directly by utilizing their own Operating System .
Scalability, availability of cloud computing helps users to access services “anytime, anywhere”.
Smart home technologies contain the system that connects automatically to common interfaces. Here electronic devices are connected with each other to form a network which is termed as service. This user finds it difficult to find availability and scalability due to the difficulties of technology in small home.
Hence combination of cloud and smart home may bring users a higher range of benefits both in terms of cost and technology.
The author hereby proposes a literature review of cloud based small home. The main stakeholders are customers, cloud service provider and developers. The aim is to provide a framework for delivering smart home services ensuring data security/privacy.
Combination of advanced features of the cloud computing; this framework is designed. Thus the above topic is an important one in cloud computing and sh research since it provides a future research criteria namely, smart city where this research will play a very vital role.

V. CONCLUSION AND FUTURE WORK

Various methods to be developed in future for anonymizing data in cloud from 2015 to 2017 is discussed. Publishing microdata such as census or patient data for extensive research and other purposes is an important problem area being focused by government agencies and other social associations. The traditional approach identified through literature survey reveals that the approach of eliminating uniquely identifying fields such as social security number from microdata, still results in disclosure of sensitive data, k-anonymization optimization algorithm ,seems to be promising and powerful in certain cases ,still carrying the restrictions that optimized k-anonymity are NP-hard, thereby leading to severe computational challenges. k-anonimity faces the problem of homogeneity attack and background knowledge attack . The notion of l-diversity proposed in the literature to address this issue also poses a number of constraints , as it proved to be inefficient to prevent attribute disclosure (skewness attack and similarity attack), l-diversity is difficult to achieve and may not provide sufficient privacy protection against sensitive attribute across equivalence class can substantially improve the privacy as against information disclosure limitation techniques such as sampling cell suppression rounding and data swapping and pertubertation. Evolution of Data Anonymization Techniques and Data Disclosure Prevention Techniques are discussed in detail. The application of Data Anonymization Techniques for several spectrum of data such as trajectory data are depicted. This survey would promote a lot of research directions in the area of database anonymization.

References










































































APPENDIX