2019
DOI: 10.1109/access.2019.2946185
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions

Abstract: Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified logic. In this paper, we systematically review and analyze relevant research achievements. First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 72 publications
(33 citation statements)
references
References 174 publications
(265 reference statements)
0
33
0
Order By: Relevance
“…e main contributions of our article are as follows: (1) We construct a trust model based on multiple factors, such as the direct trust, reward punishment, feedback trust, and trust risk, and the weight factor is determined by maximum discrete degree and information entropy. (2) We combine the trust evaluation results with the payoff matrix for game analysis and calculate the mixed Nash equilibrium strategy for the users and service providers. (3) We give the game control condition based on trust prediction and payment matrix to encourage subjects for honest access.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…e main contributions of our article are as follows: (1) We construct a trust model based on multiple factors, such as the direct trust, reward punishment, feedback trust, and trust risk, and the weight factor is determined by maximum discrete degree and information entropy. (2) We combine the trust evaluation results with the payoff matrix for game analysis and calculate the mixed Nash equilibrium strategy for the users and service providers. (3) We give the game control condition based on trust prediction and payment matrix to encourage subjects for honest access.…”
Section: Contributionsmentioning
confidence: 99%
“…Time Decay Factor. In this section, t i is the time span of the ith transaction, t 1 i is the start time of the ith transaction, t 2 i is the end time of the ith transaction, t 0 is the time of user successful registration, and n is the number of interaction times between the service provider and user, so the decay time factor T (i) is expressed as follows:…”
Section: Weight Calculationmentioning
confidence: 99%
See 1 more Smart Citation
“…Preventing unauthorised access and periodic data backup are the other necessities. Researchers are thoroughly carrying out research to improve the level of encryption and to provide enhanced security and privacy to the data stored on a cloud‐based platform [53, 54]. However, this is not the focus of present work; implementation of data security and privacy in the context of the proposed framework is left as a future task.…”
Section: Typical Case Studiesmentioning
confidence: 99%
“…Consequently, managing identities and access to cloud services is one of the primary security concerns. Hence, it is primordial to conceive flexible access control mechanisms to avoid unauthorized access [13,14]. Figure 1 shows how access control is managed in CC, it shows that the data owner sends it encrypted data to the cloud server.…”
Section: Introductionmentioning
confidence: 99%