Loading

Data Protection in Cloud Computing
Priyank Rajvanshi1, Varun Singh Nagar2, Priyanka Chawla3

1Priyank Rajvanshi, Department of Computer Science and Engineering, Amity Engineering and Technology, Noida (U.P), India.
2Varun Singh Nagar, Department of Computer Science and Engineering, Amity Engineering and Technology, Noida (U.P), India.
3Priyanka Chawla, Department of Computer Science and Engineering, Amity Engineering and Technology, Noida (U.P), India.
Manuscript received on 8 August 2013 | Revised Manuscript received on 18 August 2013 | Manuscript Published on 30 August 2013 | PP: 149-155 | Volume-3 Issue-3, August 2013 | Retrieval Number: C1122083313/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: We are in the middle of an insurgency in cloud computing. In short, cloud computing is “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or services provider interaction.” Current cloud computing systems pose serious limitation to protecting users’ data confidentiality. Since users’ sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users’ sensitive data by service providers may be high. Many techniques for protecting users’ data from outside attackers are available, but currently there exists no effective way for protecting users’ sensitive data from service providers in cloud computing. Our approach is protecting the confidentiality of users’ data from service providers, and ensures that service providers cannot access or disclose users’ confidential data being processed and stored in cloud computing systems. Our approach has three major aspects: 1) Separating software service providers and infrastructure service providers in cloud computing, 2) Hiding information of the owners of data, and 3) Data obfuscation. An example to show how our approach can protect the confidentiality of users’ data from service providers in cloud computing is given and various types of attacks in cloud computing. Service providers neither can see user’s confidential data, nor can modify it. That’s approach is presented in our paper.
Keywords: Data Confidentiality, Cloud Computing System Architecture, Data Obfuscation, Data de-obfuscation.

Scope of the Article: Cloud Computing