A Secure Data Privacy

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

A SECURE DATA PRIVACY

PRESERVATION FOR ON
DEMAND CLOUD SERVICE

PROJECT BY
K KAMALA MANASA
IIIRD INF TECHNOLOGY
BRIEF INTRO..

• With the rapid development of cloud computing, more and more enterprises/individuals are starting to outsource
local data to the cloud servers. However, under open networks and not fully trusted cloud environments, they face
enormous security and privacy risks (e.g., data leakage or disclosure, data corruption or loss, and user privacy
breach) when outsourcing their data to a public cloud or using their outsourced data. Recently, several studies were
conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in
untrusted cloud environments. To fully understand the advances and discover the research trends of this area, this
survey summarizes and analyzes the state-of-the-art protection technologies. We first present security threats and
requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the
corresponding security technologies. We then dwell on existing protection solutions to achieve secure, dependable,
and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data
access. Finally, we propose open challenges and potential research directions in each category of solutions.

BACKGROUND AND RELATED
WORK:

• BREAUX AND ANTON,2008 This example illustrates how


different parties reuse content from other parties to build more complex systems, and
how developers need tools to ensure consistency between privacy requirements across
different parties. However, at present, policies expressed in natural language remain
disconnected and hence software can freely deviate from the coordination required and
expected across these different parties. To address this problem we propose to develop a
formal language as an interlingua to describe requirements that map natural language
policy to formal statements that can eventually be the security aspect.
LIU AND CHEN(2011)
PPM-DDLC
ANOMALY
DETECTION
PROCESS
CLOUD DATA
PRIVACY EVALUATION
IN
TYPICAL MODE.
PRIVACY DURING DATA
INTEROPERABILITY
DATA PRIVACY PROTECTION IN INTER
CLOUD: (I)PROBABILITY
(II)COST EFFECTIVENESS:
CONCLUSION:

You might also like