JOURNAL ARTICLE

A Privacy Preserving System for Cloud Computing

Abstract

Cloud computing is changing the way that organizations manage their data, due to its robustness, low cost and ubiquitous nature. Privacy concerns arise whenever sensitive data is outsourced to the cloud. This paper introduces a cloud database storage architecture that prevents the local administrator as well as the cloud administrator to learn about the outsourced database content. Moreover, machine readable rights expressions are used in order to limit users of the database to a need-to-know basis. These limitations are not changeable by administrators after the database related application is launched, since a new role of rights editors is defined once an application is launched. Furthermore, trusted computing is applied to bind cryptographic key information to trusted states. By limiting the necessary trust in both corporate as well as external administrators and service providers, we counteract the often criticized privacy and confidentiality risks of corporate cloud computing.

Keywords:
Cloud computing Computer science Computer security Information privacy Cryptography Trusted Computing Cloud computing security Confidentiality Robustness (evolution) Information sensitivity Service provider Limiting Database Internet privacy Service (business) Business Engineering

Metrics

25
Cited By
4.31
FWCI (Field Weighted Citation Impact)
20
Refs
0.95
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Preserving Database Privacy in Cloud Computing

Saed AlrabaeeKhaled KhateebFawaz A. Khasawneh

Communications in computer and information science Year: 2014 Pages: 485-495
JOURNAL ARTICLE

Privacy preserving approaches in cloud computing

K. KarthibanS. Smys

Journal:   2018 2nd International Conference on Inventive Systems and Control (ICISC) Year: 2018 Pages: 462-467
© 2026 ScienceGate Book Chapters — All rights reserved.