Data Privacy in Cloud Computing, An Implementation by Django, A Python-Based Free and Open-Source Web Framework

Authors

  • V Veeresh Saveetha School of Engineering, Chennai, Tamilnadu, India
  • L Rama Parvathy Saveetha Institute of Medical and Technical Sciences, Chennai, Tamilnadu, India

Keywords:

Cloud Computing, Cloud Security, Cloud services, Crypto graphical storage, File-block keys, Native management System, Secure private keys, Un-trusted cloud

Abstract

A feasible approach for transferring cyber risk is cyber insurance but, the network security may or may not be improved depending on the underlying environment features. A single profit-maximizing insurer (principal) together with client volunteers /insured volunteers was considered in this paper with a specific interest in two distinct cyber security features along with their impact on the contract design problem. Cyber security is interconnected, meaning that an entity's level of security is influenced by others' efforts within the same ecosystem in addition to its investment and effort (i.e. externalities). Secondly, the latest advancements made in internet measurement now permit an exact quantitative analysis of security posture at the form level when combined with machine learning techniques. Hence, the effective utilization of resources can be done possibly thereby reducing the cost of the manufacturers but, the only disadvantage of cloud providers is that the information will be safe and affordable in the cloud. So, the data must be encrypted before being transferred into the cloud. Secure private keys are made available to users of a collision protection information sharing system so they can add or remove customers. Via the certified authorities and safe channels, the new customers will receive the keys from the team managers. Therefore, a revoked customer won't be able to retrieve common data documents even if they are using the cloud.  Hence, a revoked user will be prevented from data document retrieval even if they are utilizing the cloud.

Downloads

Download data is not yet available.

References

K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14–22, 2010.

E. Bacis et al., “Securing resources in decentralized cloud storage,” IEEE Trans. Inf. Forensics Sec., vol. 15, pp. 286-298, 2019 [doi:10.1109/TIFS.2019.2916673].

D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing” in International Conference on Computer Science and Electronics Engineering, vol. 1. IEEE, 2012, pp. 647-651.

K. G. Figueroa and S. Pancho-Festin, “An access control framework for semi-trusted storage using attribute-based encryption with short ciphertext and mediated revocation” in Second International Symposium on Computing and Networking. IEEE, 2014, pp. 507-513.

J. Fu and N. Wang, “A practical attribute-based document collection hierarchical encryption scheme in cloud computing,” IEEE Access, vol. 7, pp. 36218-36232, 2019 [doi:10.1109/ACCESS.2019.2905346].

J. Fu et al., “Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing,” IEEE Trans. Ind. Inform., vol. 14, no. 10, pp. 4519-4528, 2018 [doi:10.1109/TII.2018.2793350].

Gampala et al., “Data security in cloud computing with elliptic curve cryptography,” Int. J. Soft Comput. Eng. (IJSCE), vol. 2, no. 3, pp. 138-141, 2012.

U. Gupta et al., Enhancement of Cloud Security and Removal of Anti-patterns Using Multi Level Encryption Algorithms, 2018.

K. Hamlen et al., “Security issues for cloud computing,” Int. J. Inf. Sec. Privacy, vol. 4, no. 2, pp. 36-48, 2010 [doi:10.4018/jisp.2010040103].

Q. Z. Journal, “Ahmed, Farah Qasim, and lect Dr. Amin Salih Mohammed. Enhancing the Data Security in Cloud Computing by Using New Encryption Method,” vol. 3, no. 1, 2018.

P. Kalpana and S. Singaraju, “Data security in cloud computing using RSA algorithm”, International Journal of research in computer and communication technology, vol. 5841, p. 2278, 2012.

E. M. Mohamed et al., “‘Enhanced data security model for cloud computing.’ in 2012” 8th International Conference on Informatics and Systems (INFOS). IEEE, 2012, p. CC-12.

S. Namasudra, “An improved attribute‐based encryption technique towards the data security in cloud computing,” Concurrency Comput. Pract. Experience, vol. 31, no. 3, p. e4364, 2019 [doi:10.1002/cpe.4364].

R. V. Rao and K. Selvamani, “Data Security Challenges and Its Solutions in Cloud Computing” Procedia Comput. Sci., vol. 48, pp. 204-209, 2015 [doi:10.1016/j.procs.2015.04.171].

R. Shaikh and M. Sasikumar, “Data Classification for achieving Security in cloud computing,” Procedia Comput. Sci., vol. 45, no. C, pp. 493-498, 2015 [doi:10.1016/j.procs.2015.03.087].

S. K. Sood, “A combined approach to ensure data security in cloud computing,” J. Netw. Comput. Appl., vol. 35, no. 6, pp. 1831-1838, 2012 [doi:10.1016/j.jnca.2012.07.007].

S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, 2011 [doi:10.1016/j.jnca.2010.07.006].

Y. Sun et al., “Data security and privacy in cloud computing,” Int. J. Distrib. Sens. Netw., vol. 10, no. 7, p. 190903, 2014 [doi:10.1155/2014/190903].

C. Wang et al., “Privacy-preserving public auditing for data storage security in cloud computing” in 2010, Proc. IEEE Infocom. IEEE, 2010, pp. 1-9.

Q. Xu et al., “Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption,” IEEE Access, vol. 6, pp. 34051-34074, 2018 [doi:10.1109/ACCESS.2018.2844829].

X. Zhang et al., “Information security risk management framework for the cloud computing environments” in 10th IEEE international conference on computer and information technology. IEEE, 2010, pp. 1328-1334.

Z. Zhang et al., “Brij B. Gupta, and Danmei Niu,” IEEE Access, vol. 6, pp. 38273-38284, 2018 [doi:10.1109/ACCESS.2018.2854600].

Django environment

Downloads

Published

27.12.2022

How to Cite

Veeresh, V. ., & Parvathy, L. R. . (2022). Data Privacy in Cloud Computing, An Implementation by Django, A Python-Based Free and Open-Source Web Framework. International Journal of Intelligent Systems and Applications in Engineering, 10(3s), 56–66. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2412

Issue

Section

Research Article