CFP last date
20 May 2024
Reseach Article

Implementation of Information Leakage Avoiding (ILA) Application in Cloud Computing

by Poonam Sawdekar, Seema Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 13
Year of Publication: 2014
Authors: Poonam Sawdekar, Seema Shah
10.5120/17070-7501

Poonam Sawdekar, Seema Shah . Implementation of Information Leakage Avoiding (ILA) Application in Cloud Computing. International Journal of Computer Applications. 97, 13 ( July 2014), 54-57. DOI=10.5120/17070-7501

@article{ 10.5120/17070-7501,
author = { Poonam Sawdekar, Seema Shah },
title = { Implementation of Information Leakage Avoiding (ILA) Application in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 13 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 54-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number13/17070-7501/ },
doi = { 10.5120/17070-7501 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:03.323671+05:30
%A Poonam Sawdekar
%A Seema Shah
%T Implementation of Information Leakage Avoiding (ILA) Application in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 13
%P 54-57
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides highly scalable services to be easily consumed over the internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud have not been carefully addressed at current stage. Users' fear of confidential data leakage and loss of privacy in the cloud may become a significant barrier to the wide adoption of cloud services. In this paper, we explore a newly emerging problem of information leakage caused by indexing in the cloud. We design three-tier data protection architecture to accommodate various levels of privacy concerns by users.

References
  1. Anna Squicciarini and Smitha Sundareswaran: "Preventing Information Leakage from Indexing in the Cloud," in 2010 IEEE 3rd International Conference on Cloud Computing.
  2. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proc, of ACM conference on Computer and communications security, pages 598–609, 2007.
  3. Mayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, and Jaideep Vaidya. Privacy -preserving indexing of documents on the network. VLDB J. , 18(4):837–856, 2009.
  4. Y. -C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. February 2004.
  5. Wei-Tek Tsai, Xin Sun, Janaka Balasooriya," Service-Oriented Cloud Computing Architecture", Seventh International Conference on Information Technology, 2010.
  6. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gong," The Characteristics of Cloud Computing", 39th International Conference on parallel Processing Workshops, 2010.
  7. R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum, 2009.
  8. B. R. Kandukuri, R. P. V. , and A. Rakshit. Cloud security issues. In IEEE International Conference on Services Computing (SCC), pages 517–520, 2009.
  9. L. M. Kaufman. Data security in the World of Cloud Computing. IEEE Security and Privacy, 7(4):61–64, 2009.
  10. M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX Annual Technical Conference, pages 29–41, 2003.
  11. S. Pearson and A. Charlesworth. Accountability as a way forward for privacy protection in the cloud. Hewlett-Packard Development Company (HPL-2009-178), 2009.
  12. B. P. Rimal, E. Choi, and I. Lumb. A taxonomy and survey of Cloud Computing systems. Networked Computing and Advanced Information Management, International Conference on, 0:44–51, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Implementation Information