Ensuring Security and Privacy Preservation for Cloud Data Services

被引:208
作者
Tang, Jun [1 ,2 ]
Cui, Yong [1 ]
Li, Qi [3 ]
Ren, Kui [4 ]
Liu, Jiangchuan [5 ]
Buyya, Rajkumar [6 ]
机构
[1] Tsinghua Univ, FIT Bldg, Beijing 100084, Peoples R China
[2] Zhengzhou Inst Informat Sci & Technol, Sci Ave, Zhengzhou 450001, Peoples R China
[3] Tsinghua Univ, Grad Sch Shenzhen, Lishui Rd, Shenzhen 518055, Peoples R China
[4] SUNY Buffalo, 317 Davis Hall, Buffalo, NY USA
[5] Simon Fraser Univ, TASC 9005, Burnaby, BC, Canada
[6] Univ Melbourne, Dept Comp & Informat Syst, Grattan St, Melbourne, Vic 3010, Australia
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Cloud computing; cloud data service; data security; privacy preservation; FULLY HOMOMORPHIC ENCRYPTION; EFFICIENT; ACCESS; SEARCH;
D O I
10.1145/2906153
中图分类号
TP301 [理论、方法];
学科分类号
080201 [机械制造及其自动化];
摘要
With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource local data to the cloud servers. However, under open networks and not fully trusted cloud environments, they face enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy breach) when outsourcing their data to a public cloud or using their outsourced data. Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments. To fully understand the advances and discover the research trends of this area, this survey summarizes and analyzes the state-of-the-art protection technologies. We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies. We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access. Finally, we propose open challenges and potential research directions in each category of solutions.
引用
收藏
页数:39
相关论文
共 134 条
[1]
[Anonymous], PRIVACY PRESERVING S
[2]
[Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-29860-8
[3]
[Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
[4]
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[5]
[Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
[6]
[Anonymous], FORECAST CONSUMER DI
[7]
[Anonymous], P WPES
[8]
[Anonymous], P IEEE INT C COMP CO
[9]
[Anonymous], P NETW DISTR SYST SE
[10]
[Anonymous], 1996, SECURE SCHEMES SECRE