Layer-based privacy and security architecture for cloud data sharing

The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to the client, we propose a layered architecture....

Full description

Permalink: http://skupnikatalog.nsk.hr/Record/nsk.NSK01001075133/Details
Matična publikacija: Journal of communications software and systems (Online)
15 (2019), 2 ; str. 173-185
Glavni autori: Gupta, Ishu (Author), Singh, Niharika, Singh, Ashutosh Kumar
Vrsta građe: e-članak
Jezik: eng
Predmet:
Online pristup: https://doi.org/10.24138/jcomss.v15i2.617
Journal of communications software and systems (Online)
Hrčak
LEADER 02791naa a22003734i 4500
001 NSK01001075133
003 HR-ZaNSK
005 20201026145320.0
006 m d
007 cr||||||||||||
008 200923s2019 ci d |o |0|| ||eng
024 7 |2 doi  |a 10.24138/jcomss.v15i2.617 
035 |a (HR-ZaNSK)001075133 
040 |a HR-ZaNSK  |b hrv  |c HR-ZaNSK  |e ppiak 
041 0 |a eng  |b eng 
042 |a croatica 
044 |a ci  |c hr 
080 1 |a 004  |2 2011 
100 1 |a Gupta, Ishu  |4 aut  |9 HR-ZaNSK 
245 1 0 |a Layer-based privacy and security architecture for cloud data sharing  |h [Elektronička građa] /  |c Ishu Gupta, Niharika Singh, Ashutosh Kumar Singh. 
300 |b Graf. prikazi. 
504 |a Bibliografija: 51 jed. 
504 |a Summary. 
520 |a The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to the client, we propose a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categorization requires different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity; public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layered approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach. 
653 0 |a Računarstvo u oblaku  |a Prijenos podataka  |a Privatnost podataka  |a Sigurnost informacija 
700 1 |a Singh, Niharika  |4 aut  |9 HR-ZaNSK 
700 1 |a Singh, Ashutosh Kumar  |4 aut  |9 HR-ZaNSK 
773 0 |t Journal of communications software and systems (Online)  |x 1846-6079  |g 15 (2019), 2 ; str. 173-185  |w nsk.(HR-ZaNSK)000644741 
981 |b Be2019  |b B05/19 
998 |b dalo2010 
856 4 0 |u https://doi.org/10.24138/jcomss.v15i2.617 
856 4 0 |u https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/617  |y Journal of communications software and systems (Online) 
856 4 1 |y Digitalna.nsk.hr 
856 4 0 |u https://hrcak.srce.hr/220970  |y Hrčak