Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
Abstract
:1. Introduction
- The private cloud is usually utilized by a limited number of users capable of accessing highly confidential data.
- The public cloud is commonly employed for hosting sensitive data, in which data integrity is repeatedly mutable.
- The hybrid cloud combines two or more delivery models. This model can be applicable to cloud users who would like to retain their most crucial data on-premises while storing their fundamental data on the cloud. The combined delivery models can be private-, public-, or community-based models; however, a standardized technology can be utilized to bound the data. The hybrid cloud improves security and lowers the price. However, the high management complexity is the major drawback.
- The community cloud can be considered as a type of public cloud in which various cloud clients share a specific infrastructure with a community that engages with one another on an identical interest.
1.1. Research Contribution
- The state-of-the-art privacy-preserving TPA-based models for cloud computing are extensively discussed. In addition, these TPA-based models are categorized based on unique characteristics.
- The expected vulnerabilities of cloud computing are comprehensively discussed as they are used by the TPA to launch the threats for violating data privacy.
- TPA-based privacy-preserving security challenges are discussed, and recommendations are suggested either to control or mitigate the malicious intent of the TPA in the cloud computing environment.
1.2. Paper Organization
2. Research Methodology
3. Related Reviews/Surveys
4. Vulnerabilities, and Potential Threats
4.1. TPA-Based Cloud Vulnerabilities
- Loss of control;
- Lack of trust (mechanisms).
4.1.1. Loss of Control
4.1.2. Lack of Trust (Mechanisms)
- Privileged user access;
- Regulatory compliance;
- Data location;
- Data segregation;
- Recovery;
- Investigative support;
- Long-term viability.
4.2. TPA-Based Cloud Threats
4.2.1. Collusion Threats
- Self-promoting: malicious cloud clients falsely promote a specific cloud service provider by recording remarkable positive feedback;
- Slandering: malicious cloud clients defame a specific cloud service provider by sending remarkable negative feedback;
- Occasional collusion feedback attack: this kind of attack occurs when a remarkable negative or positive feedback is occasionally entered by malicious cloud clients.
4.2.2. Sybil Threats
- Self-promoting: this is also known as a ballot-stuffing attack. In this attack, significant positive feedback is added by malicious cloud clients to promote a specific cloud service provider;
- Slandering: another name of this attack is bad-mouthing. This attack is launched by malicious cloud clients to defame a specific cloud service provider using significant negative ratings.
- Occasional Sybil feedback attack: in this attack, significant amounts of negative or positive feedback are entered occasionally by malicious cloud client to either promote or defame a specific cloud service provider.
4.2.3. ON OFF Threat or Intoxication Threat
4.2.4. Discrimination Threat
4.2.5. Newcomer or Reentry Threat
5. Recapitulation of TPA Studied Methods
5.1. Privacy-Preserving Model (PPM)
5.1.1. Security and Privacy For Storage
- “KeyGenÓ: this algorithm is utilized by the cloud client to generate the public key encryption pair (i.e., the public key and the private key);
- ÒOutsourceÓ: this algorithm is also employed by the cloud client to transfer the data to the CSP;
- ÒAuditÓ: this algorithm is utilized by the TPA to transmit the audited query to the CSP;
- ÒProveÓ: this algorithm is employed by the CSP once the audit query is received from the TPA. Subsequently, the CSP uses the stored data to generate a proof;
- ÒVerifyÓ: this algorithm is utilized by the TPA once the proof is received. The purpose of this algorithm is to check if the proof is correct and not using the public key.
5.1.2. PANDA Public Auditing (PPA)
- ”KeyGen”: the purpose of this algorithm is to generate keys for the cloud client and the TPA;
- “SigGen”: this algorithm is utilized by the TPA to generate the verification metadata;
- “GenProof”: the cloud service provider uses this algorithm to inspect the storage correctness of data and to generate the data state’s proof;
- “VerifyProof”: this algorithm is utilized by the TPA to verify the evidence correctness provided by the CSP.
5.1.3. Privacy-Preserving Public Auditing (PPPAS)
5.1.4. Secure and Efficient Privacy-Preserving Public Auditing (SEPPPA) Protocol
5.1.5. Privacy-Preserving Public Auditing for Shared Cloud Data
5.1.6. Comments on Privacy-Preserving Public Auditing Mechanisms for Shared Cloud Data
5.1.7. Third Party Auditor: A Potential Solution for Securing a Cloud Environment
5.1.8. Privacy-Preserving Model: A New Scheme for Auditing Cloud Stakeholders
5.1.9. Cloud Data Integrity Using a Designated Public Verifier
5.1.10. Based on Homomorphic Nonlinear Authenticator
5.1.11. Based on the Proxy Re-Signature Scheme
- Token precomputation is the aim of the first algorithm;
- To measure accuracy, location errors, and verification, the second algorithm is presented;
- Error recovery is achieved with the help of the third algorithm.
5.2. Elaborated Key Exchange Algorithm Based on RSA
5.2.1. RSA Based Storage Security
5.2.2. Novel Third Party Auditor Scheme
- System setup: this phase facilitates both the cloud server and the organization server to identify each other. Thereafter, unique identifiers are given to storage servers, which prove their identities in the cloud.
- Key or information exchanges: in case some information is updated in any server, this server should send the update to the other servers in the cloud. This is also the case when an update of the keys occurred in the cloud server, and the cloud server must inform the organization’s server.
5.3. Based on Diffie-Hellman
Data Privacy by Authenticating and Secret Sharing (PASS)
- Symmetric bivariate polynomial-based sharing: two types of sharing are supported, a symmetric-based sharing and an asymmetric-based sharing. Therefore, to develop secure cloud computing, symmetric bivariate-base sharing is adopted to use informative feature symmetric properties.
- Elliptic curve Diffie-Hellman (ECDH): this protocol is used because it has most of the capabilities that the elliptic cure discrete algorithm has and is less complex than the multiplicative group algorithm.
5.4. Based on Proof of Retrievability
5.4.1. Proof of Ownership and Retrievability (PoOR) Using Homomorphic Verifiable Tags
5.4.2. Optimized Proof of Retrievability Scheme
- Client: an individual or organization that owns data files to transmit to the cloud;
- Cloud storage servers (CSS): the CSP coordinates some entities known as CSSs that utilize cloud audit servers to check integrity;
- Cloud audit server (CAS): when the clients request to access services, the TPA accesses services instead of clients because it has the capabilities and expertise to be trusted.
5.4.3. Secure Certificateless Private Verification (SCLPV)
5.5. Based on Erasure Correcting Code
5.5.1. Layered Interleaving Technique
- Third party auditor:Delegated data auditing should not be able to lead to the obtaining of clients’ data content. The cloud server verification attributes should be sent by the client in an encrypted and secure manner.
- Cloud service provider:This entity consists of resources and has a specific expertise in constructing and coordinating distributed cloud storage servers. Cloud computing systems are owned and operated by the CSP. Furthermore, a CSP can lease the cloud computing systems.
- Security analysis:Step 1: Creating a challenge token: The client precomputes some verification tokens and sends them to different servers once the file is stored in the cloud. Each server signs the token and transmits it back to the client, so that the client can have a handshaking response for that data that has been stored in the cloud.Step 2: Correctness verification: The correctness of distributed storage is not only specified by the response challenge transmitted from the server, but it can also be verified from a secure server.Step 3: Data recovery: the data retrieved from the server can be defined as either affected or not affected by malicious users in this step.
5.5.2. Privacy Negotiation Language (PNL) Based on Description Logic
5.6. Audit and Feedback Scheme
Securing the Cloud Storage Audit Scheme
5.7. Based on Oruta and Knox Approach
5.7.1. Secure Digital Signature Scheme
- Oruta analysis;
- Knox analysis;
- A security problem solution.
5.7.2. Based on Bilinearity Property
- Third party storage audit service
- -
- Data confidentiality;
- -
- Dynamic auditing;
- -
- Batch auditing.
5.7.3. Based on Consensus Assessments Initiative Questionnaire (CAIQ)
- Utilizing third party auditing to manage trust in the cloud:
5.7.4. Based on Encryption and Secret Key
- A trusted third party based encryption scheme for ensuring data confidentiality in cloud environment:
5.7.5. Based on a Centralized Approach
- A centralized trust model approach for cloud computing
5.8. Based on Computational Intelligence
- A Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing:
6. TPA-Based Security Challenges and Recommendations
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Razaque, A.; Jararweh, Y.; Alotaibi, B.; Alotaibi, M.; Hariri, S.; Almiani, M. Energy-efficient and secure mobile fog-based cloud for the Internet of Things. Future Gener. Comput. Syst. 2021, 127, 1–13. [Google Scholar] [CrossRef]
- Huang, H.; Sun, X.; Xiao, F.; Zhu, P.; Wang, W. Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments. J. Parallel Distrib. Comput. 2021, 148, 46–57. [Google Scholar] [CrossRef]
- Ibrahim, F.A.; Hemayed, E.E. Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review. Comput. Secur. 2019, 82, 196–226. [Google Scholar] [CrossRef]
- Razaque, A.; Vennapusa, N.R.; Soni, N.; Janapati, G.S. Task scheduling in cloud computing. In Proceedings of the Systems, Applications and Technology Conference (LISAT) 2016 IEEE Long Island, Farmingdale, NY, USA, 29 April 2016; pp. 1–5. [Google Scholar]
- Arwa, M.; Hamdan, M.; Khan, S.; Abdelaziz, A.; Babiker, S.F.; Imran, M.; Marsono, M.N. Software-defined networks for resource allocation in cloud computing: A survey. Comput. Netw. 2021, 195, 108151. [Google Scholar]
- Yeh, T.; Chen, Y. Improving the hybrid cloud performance through disk activity-aware data access. Simul. Model. Pract. Theory 2021, 109, 102296. [Google Scholar] [CrossRef]
- Razaque, A.; Li, Y.; Liu, Q.; Khan, M.J.; Doulat, A.; Almiani, M.; Alflahat, A. Enhanced Risk Minimization Framework for Cloud Computing Environment. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–7. [Google Scholar]
- Kalluri, R.K.; Guru, C.V. An effective analytics of third party auditing and Trust architectures for integrity in cloud environment. Mater. Today Proc. 2021, 79, 69–76. [Google Scholar] [CrossRef]
- Jansen, W.A. Cloud hooks: Security and privacy issues in cloud computing. In Proceedings of the IEEE 2011 44th Hawaii International Conference on System Sciences, Washington, DC, USA, 4–7 January 2011; pp. 1–10. [Google Scholar]
- Jhawar, R.; Piuri, V. Fault tolerance and resilience in cloud computing environments. In Computer and Information Security Handbook, 3rd ed.; ScienceDirect: Amsterdam, The Netherlands, 2017; pp. 165–181. [Google Scholar]
- Patel, A.; Taghavi, M.; Bakhtiyari, K.; Júnior, J.C. An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 2013, 36, 25–41. [Google Scholar] [CrossRef]
- Raghav, I.; Chhikara, S.; Hasteer, N. Intrusion detection and prevention in cloud environment: A systematic review. Int. J. Comput. Appl. 2013, 68, 7–11. [Google Scholar] [CrossRef]
- Modi, C.N.; Acha, K. Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: A comprehensive review. J. Supercomput. 2017, 73, 1192–1234. [Google Scholar] [CrossRef]
- Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A. Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. J. Inf. Secur. Appl. 2020, 55, 102582. [Google Scholar] [CrossRef]
- Kene, S.G.; Theng, D.P. A review on intrusion detection techniques for cloud computing and security challenges. In Proceedings of the IEEE 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 26–27 February 2015; pp. 227–232. [Google Scholar]
- Paxton, N.C. Cloud security: A review of current issues and proposed solutions. In Proceedings of the 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, USA, 1–3 November 2016; pp. 452–455. [Google Scholar]
- Manral, B.; Somani, G.; Choo, K.K.R.; Conti, M.; Gaur, M.S. A systematic survey on cloud forensics challenges, solutions, and future directions. ACM Comput. Surv. (CSUR) 2019, 52, 1–38. [Google Scholar] [CrossRef] [Green Version]
- Ru, J.; Yang, Y.; Grundy, J.; Keung, J.; Hao, L. A systematic review of scheduling approaches on multi-tenancy cloud platforms. Inf. Softw. Technol. 2020, 132, 106478. [Google Scholar]
- Albugmi, A.; Alassafi, M.O.; Walters, R.; Wills, G. Data security in cloud computing. In Proceedings of the 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), London, UK, 17–19 August 2016; pp. 55–59. [Google Scholar] [CrossRef] [Green Version]
- Shakarami, A.; Ghobaei-Arani, M.; Shahidinejad, A.; Masdari, M.; Shakarami, H. Data replication schemes in cloud computing: A survey. Clust. Comput. 2021, 24, 2545–2579. [Google Scholar] [CrossRef]
- Domingo-Ferrer, J.; Farras, O.; Ribes-Gonlez, J.; Sánchez, D. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput. Commun. 2019, 140, 38–60. [Google Scholar] [CrossRef]
- Karthiban, K.; Smys, S. Privacy preserving approaches in cloud computing. In Proceedings of the IEEE 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 19–20 January 2018; pp. 462–467. [Google Scholar]
- Perez-Botero, D.; Szefer, J.; Lee, R.B. Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the ACM 2013 International Workshop on Security in Cloud Computing, Dresden, Germany, 9–12 December 2013; pp. 3–10. [Google Scholar]
- Razaque, A.; Amsaad, F.; Hariri, S.; Almasri, M.; Rizvi, S.S.; Frej, M.B.H. Enhanced grey risk assessment model for support of cloud service provider. IEEE Access 2020, 8, 80812–80826. [Google Scholar] [CrossRef]
- Razaque, A.; Nadimpalli, S.S.V.; Vommina, S.; Atukuri, D.K.; Reddy, D.N.; Anne, P.; Vegi, D.; Malllapu, V.S. Secure data sharing in multi-clouds. In Proceedings of the IEEE 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 1909–1913. [Google Scholar]
- Dunne, N.J.; Brennan, N.M.; Kirwan, C.E. Impression management and Big Four auditors: Scrutiny at a public inquiry. Account. Organ. Soc. 2021, 88, 101170. [Google Scholar] [CrossRef]
- Wei, L.; Zhu, H.; Cao, Z.; Dong, X.; Jia, W.; Chen, Y.; Vasilakos, A.V. Security and privacy for storage and computation in cloud computing. Inf. Sci. 2014, 258, 371–386. [Google Scholar] [CrossRef]
- Hussien, Z.A.; Jin, H.; Abduljabbar, Z.A.; Yassin, A.A.; Hussain, M.A.; Abbdal, S.H.; Zou, D. Public auditing for secure data storage in cloud through a third-party auditor using modern ciphertext. In Proceedings of the IEEE 2015 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14–16 December 2015. [Google Scholar]
- Wang, B.; Li, B.; Li, H. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 2013, 8, 92–106. [Google Scholar] [CrossRef] [Green Version]
- Pavithra, S.; Thangadurai, E.; Mailsamy, M. Secure Data Storage in Cloud using Code Regeneration and public audition. Int. J. Emerg. Technol. Comput. Sci. Electron. 2016, 20, 65–68. [Google Scholar]
- Razaque, A.; Rizvi, S.S. Privacy preserving model: A new scheme for auditing cloud stakeholders. J. Cloud Comput. 2017, 6, 7. [Google Scholar] [CrossRef]
- Shrinivas, D. Privacy-preserving public auditing in cloud storage security. Int. J. Comput. Sci. Nad Inf. Technol. 2011, 2, 2691–2693. [Google Scholar]
- Shen, W.; Yu, J.; Xia, H.; Zhang, H.; Lu, X.; Hao, R. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third-party medium. J. Netw. Comput. Appl. 2017, 82, 56–64. [Google Scholar] [CrossRef]
- Wang, B.; Li, B.; Li, H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In Proceedings of the International Conference on Applied Cryptography and Network Security, Kamakura, Japan, 21–24 June 2012; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Girma, A.; Garuba, M.; Li, J. Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main Characteristics. In Proceedings of the 2015 12th International Conference on Information Technology-New Generations, Las Vegas, NV, USA, 13–15 April 2015; pp. 206–211. [Google Scholar]
- Anbuchelian, S.; Sowmya, C.M.; Ramesh, C. Efficient and secure auditing scheme for privacy preserving data storage in cloud. Clust. Comput. 2019, 22, 9767–9775. [Google Scholar] [CrossRef]
- Worku, S.G.; Xu, C.; Zhao, J.; He, X. Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 2014, 40, 1703–1713. [Google Scholar] [CrossRef]
- Gajendra, B.P.; Singh, V.K.; Sujeet, M. Achieving cloud security using third party auditor, MD5 and identity-based encryption. In Proceedings of the IEEE 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 29–30 April 2016; pp. 1304–1309. [Google Scholar]
- Yang, K.; Jia, X. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 2012, 24, 1717–1726. [Google Scholar] [CrossRef]
- Moghaddam, F.F.; Karimi, O.; Alrashdan, M.T. A comparative study of applying real-time encryption in cloud computing environments. In Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet), San Francisco, CA, USA, 11–13 November 2013; pp. 185–189. [Google Scholar]
- Kundu, N.; Debnath, S.K.; Mishra, D. A secure and efficient group signature scheme based on multivariate public key cryptography. J. Inf. Secur. Appl. 2021, 85, 102776. [Google Scholar]
- Wang, B.; Li, H.; Li, M. Privacy-preserving public auditing for shared cloud data supporting group dynamics. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013. [Google Scholar]
- Wang, Q.; Wang, C.; Ren, K.; Lou, W.; Li, J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 847–859. [Google Scholar] [CrossRef] [Green Version]
- Wu, T.Y.; Lin, Y.; Wang, K.H.; Chen, C.M.; Pan, J.S.; Wu, M.E. Comments on a privacy preserving public auditing mechanism for shared cloud data. In Proceedings of the ACM 4th Multidisciplinary International Social Networks Conference on ZZZ, Bangkok, Thailand, 17–19 July 2017. [Google Scholar]
- Rizvi, S.; Razaque, A.; Cover, K. Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. In Proceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, USA, 3–5 November 2015. [Google Scholar]
- Rizvi, S.; Razaque, A.; Cover, K. Cloud Data Integrity Using a Designated Public Verifier. In Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 24–26 August 2015. [Google Scholar]
- Ren, Y.; Yang, Z.; Wang, J.; Fang, L. Attributed Based Provable Data Possession in Public Cloud Storage. In Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014. [Google Scholar]
- Hao, Z.; Yu, N. A multiple-replica remote data possession checking protocol with public verifiability. In Proceedings of the 2010 Second International Symposium on Data, Privacy, and E-Commerce, Buffalo, NY, USA, 13–14 September 2010. [Google Scholar]
- Erway, C.C.; Küpçü, A.; Papamanthou, C.; Tamassia, R. Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 2015, 17, 15. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.; Wang, Q.; Ren, K.; Lou, W. Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 2010 Proceedings IEEE Infocom, San Diego, CA, USA, 14–19 March 2010. [Google Scholar]
- Jianhong, Z.; Hua, C. Secuirty storage in the cloud computing: A rsa-based assumption data integrity check without original data. In Proceedings of the 2010 International Conference on Educational and Information Technology, Chongqing, China, 17–19 September 2010. [Google Scholar]
- Yang, C.N.; Lai, J.B. Protecting data privacy and security for cloud computing based on secret sharing. In Proceedings of the 2013 International Symposium on Biometrics and Security Technologies, Chengdu, China, 2–5 July 2013. [Google Scholar]
- Zheng, Q.; Xu, S. Secure and efficient proof of storage with deduplication. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, 7–9 February 2012. [Google Scholar]
- Zheng, Q.; Xu, S. Fair and dynamic proofs of retrievability. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, 21–23 February 2011. [Google Scholar]
- Singh, R.; Kumar, S.; Agrahari, S.K. Ensuring Data Storage Security in Cloud Computing. IOSR J. Eng. 2012, 2, 12. [Google Scholar] [CrossRef]
- Zhang, Y.; Pan, J.; Qi, L.; He, Q. Privacy-preserving quality prediction for edge-based IoT services. Future Gener. Comput. Syst. 2021, 114, 336–348. [Google Scholar] [CrossRef]
- Huang, L.; Zhang, G.; Fu, A. Privacy-preserving public auditing for non-manager group. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
- Yang, K.; Jia, X. TSAS: Third-Party Storage Auditing Service. In Security for Cloud Storage Systems; Springer: Berlin/Heidelberg, Germany, 2014; pp. 7–37. [Google Scholar]
- Zhu, Y.; Wang, H.; Hu, Z.; Ahn, G.J.; Hu, H.; Yau, S.S. Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan, 21–24 March 2011. [Google Scholar]
- Sharma, N.; Tyagi, S.; Atri, S. A Survey on Heuristic Approach for Task Scheduling in Cloud Computing. Int. J. Adv. Res. Comput. Sci. 2017, 8, 3. [Google Scholar]
- Shimbre, N.; Deshpande, P. Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm. In Proceedings of the IEEE 2015 International Conference on Computing Communication Control and Automation, Pune, India, 26–27 February 2015. [Google Scholar]
- Kaur, M.; Mahajan, M. Using encryption algorithms to enhance the data security in cloud computing. Int. J. Commun. Comput. Technol. 2013, 1, 56–59. [Google Scholar]
- Suresh, K.; Prasad, K. Security issues and Security algorithms in Cloud Computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2012, 2, 110–114. [Google Scholar]
- Akbari, E.; Cung, F.; Patel, H.; Razaque, A.; Dalal, H.N. Incorporation of weighted linear prediction technique and M/M/1 Queuing Theory for improving energy efficiency of Cloud computing datacenters. In Proceedings of the 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, 29 April 2016; pp. 1–5. [Google Scholar]
Existing Reviews/ Survey | Summary | Scope and Focus |
---|---|---|
[11,12,13,14,15] | Review of intrusion detection and prevention systems (IDPS) in cloud computing | These papers cover the intrusion detection and prevention systems (IDPS) |
[16,17,18] | Review of the cloud vulnerabilities from the multitenancy perspective | The authors mainly cover multitenancy threats |
[19,20] | Comprehensive reviews are conducted on the data security from the cloud computing perspective. | The authors cover data security |
[21,22] | Privacy preserving models and protocols are surveyed in the cloud computing | These papers cover privacy-preserving in cloud computing |
Our proposed survey | This survey presents the privacy-preservation-focused TPA approaches, vulnerabilities, and potential threats in the cloud computing environment | Focus on cloud computing adopting a third-party auditor |
Method | KEY-GEN | SIG-GEN | GEN-PROOF | Verify-PROOF | Homomorphic Linear Authenticator | Bilinear Signature | Symmetric Key | Data Security | Generating Signature |
---|---|---|---|---|---|---|---|---|---|
SPS [27] | ✓ | ✓ | ✓ | ||||||
PPPAS [28] | ✓ | ✓ | ✓ | ✓ | |||||
PPA [29] | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
SEPPPA [30] | ✓ | ✓ | ✓ | ✓ | |||||
DPVPPM [31] | ✓ | ||||||||
EPASS [32] | ✓ | ✓ | ✓ | ✓ | |||||
RSASS [33] | ✓ | ||||||||
TSAS [34] | ✓ | ||||||||
ESTTP [35] | ✓ |
Security Model | Security Requirements | Threats | Advantages |
---|---|---|---|
SPS [27] |
|
|
|
PPA [37] |
|
|
|
PPPAS [39] |
|
|
|
SEPPPA [40] |
|
|
|
PPPASCD [41] |
|
|
|
MPPA [43] |
|
|
|
SCETPA [44] |
|
|
|
PPMACS [45] |
|
|
|
DPVPPM [31] |
|
|
|
DPS [46] |
|
|
|
PPACSS [49] |
|
|
|
RSASS [33] |
|
|
|
NTPA [51] |
|
|
|
PoOR [52] |
|
|
|
OPoR [53] |
|
|
|
SCPV [54] |
|
|
|
PNL [55] |
|
|
|
DEDP [56] |
|
|
|
PASNSD [57] |
|
|
|
TSAS [34] |
|
|
|
MTTPA [59] |
|
|
|
ESTTP [35] |
|
|
|
CTM [61] |
|
|
|
TPPCSS [62] |
|
|
|
Existing Solutions against Malicious TPA | Strength | Weakness | Recommendations/Remarks |
---|---|---|---|
RSA-based storage security mechanisms | Reducing computational cost and enhance data confidentiality | Can be compromised by TPA | These methods are not completely suitable to determine the malicious intent of the TPA |
Data encryption techniques | Enhancing data confidentiality | Can be compromised by TPA | These methods do not provide complete protection against malicious intent of the TPA |
Knox and Oruta methods | Supportive in verification process | Might be corrupted by the malicious TPA | These methods are not particularly designed for malicious intent of the TPA |
Privacy negotiation mechanisms | Protecting privacy preservation of the cloud entities against Byzantine failures and colluding attacks | Negotiator could be malicious TPA | These methods do not guarantee data protection due to attack of TPA |
Privacy-preserving auditing models | Mitigating the malicious intent of the TPA | Inheriting negative features of high time-complexity and additional bandwidth consumption | These methods can reduce the malicious intent of the TPA in some particular scenarios but cannot completely provide the solution |
Third-party storage audit services methods | Reducing the communication cost | The security auditing protocols can be affected | These methods do not provide perfect protection against the malicious TPA |
Public auditing mechanisms for TPA | Reducing the communication and computation costs | An internal attack of the TPA might be a serious issue | These methods can work in particular scenarios but not permanent solution against TPA |
Trust management TPA models | Effective security protection | No support for the cloud client feedback | These models show the domination of TPA. Therefore, the TPA can easily play the role of malicious TPA |
Data possession models | Provide data anonymity | Not TPA-specific | These models are not properly designed for TPA |
Centralized trust models | Achieving the trust of cloud clients and facilitates updating changes | feedback reported by cloud clients is not always trusted. | These models are not particularly designed for TPA |
Random masking and homomorphic nonlinear techniques | Providing decent efficiency even if the TPA carries out various auditing tasks. | TPA can be able to obtain a local copy of the data | These methods are not supportive to determine the malicious intent of the TPA |
Lightweight security privacy-preserving models | Providing authentication and confidentiality by using the mutual authentication and secret data sharing processes. Furthermore, information exchange cost can be decreased. | A few models are available for TPA, but those models are still not matured | These methods are suitable to detect the malicious intent of the TPA |
Secure certificateless public verification methods | Key generation center possesses the complete power and is implicitly trusted. Trust can be built between TPA and either cloud service provider or client | Key generation center can be compromised. As a result, TPA has an access to the public key partially and private keys of all clients | These methods are good for protecting data privacy against malicious TPA, but there is a possibility that key generation center can be compromised by the TPA |
Designated public verifier | Reliability can also significantly be improved. In addition, computational complexity can also be decreased | No state-of-the art models are available | These models can be supportive against the malicious intent of the TPA |
Layered interleaving models | Recovering singleton losses efficiently during the auditing process. Furthermore, data contents cannot be exposed to the TPA | A few models are available but they are not fully matured | These models can protect the data privacy against the malicious intent of the TPA |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Razaque, A.; Frej, M.B.H.; Alotaibi, B.; Alotaibi, M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics 2021, 10, 2721. https://doi.org/10.3390/electronics10212721
Razaque A, Frej MBH, Alotaibi B, Alotaibi M. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics. 2021; 10(21):2721. https://doi.org/10.3390/electronics10212721
Chicago/Turabian StyleRazaque, Abdul, Mohamed Ben Haj Frej, Bandar Alotaibi, and Munif Alotaibi. 2021. "Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey" Electronics 10, no. 21: 2721. https://doi.org/10.3390/electronics10212721
APA StyleRazaque, A., Frej, M. B. H., Alotaibi, B., & Alotaibi, M. (2021). Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey. Electronics, 10(21), 2721. https://doi.org/10.3390/electronics10212721