Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize the...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/bb1c23583e8c431986e833ad1a880c00 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:bb1c23583e8c431986e833ad1a880c00 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:bb1c23583e8c431986e833ad1a880c002021-11-11T15:42:42ZPrivacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey10.3390/electronics102127212079-9292https://doaj.org/article/bb1c23583e8c431986e833ad1a880c002021-11-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2721https://doaj.org/toc/2079-9292Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.Abdul RazaqueMohamed Ben Haj FrejBandar AlotaibiMunif AlotaibiMDPI AGarticlecloud computingsecurityservice level agreementprivacy-preserving modelthird-party auditorcloud service providerElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2721, p 2721 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cloud computing security service level agreement privacy-preserving model third-party auditor cloud service provider Electronics TK7800-8360 |
spellingShingle |
cloud computing security service level agreement privacy-preserving model third-party auditor cloud service provider Electronics TK7800-8360 Abdul Razaque Mohamed Ben Haj Frej Bandar Alotaibi Munif Alotaibi Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
description |
Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement. |
format |
article |
author |
Abdul Razaque Mohamed Ben Haj Frej Bandar Alotaibi Munif Alotaibi |
author_facet |
Abdul Razaque Mohamed Ben Haj Frej Bandar Alotaibi Munif Alotaibi |
author_sort |
Abdul Razaque |
title |
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
title_short |
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
title_full |
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
title_fullStr |
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
title_full_unstemmed |
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey |
title_sort |
privacy preservation models for third-party auditor over cloud computing: a survey |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/bb1c23583e8c431986e833ad1a880c00 |
work_keys_str_mv |
AT abdulrazaque privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey AT mohamedbenhajfrej privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey AT bandaralotaibi privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey AT munifalotaibi privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey |
_version_ |
1718434113246986240 |