A survey on security over data outsourcing

M. Thangavel, P. Varalakshmi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Today's world business depends on outsourcing the computing and storage. Lack of Security on Data Outsourcing is an important issue and becomes one of the wider areas in the Information science research field. The major challenges of outsourcing the data over un-trusted parties are providing confidentiality, maintaining integrity, Access control of multi- owners data, and user revocation of shared data. This paper addresses the analysis of security over data outsourcing on different concerns like Attribute based encryption (ABE), Key management, Anonymous authentication, User revocation and Access control. ABE is one type of a public key cryptosystem which has its more attraction for encrypting data, user revocation issues and access control particularly in case of data outsourcing. Securing and Managing the keys is as important as securing the data. Anonymous authentication is essential for the special cases where the user may wish to store sensitive data without revealing their identity. This paper surveyed all the different types of techniques used to enhance the security of outsourced data.

    Original languageEnglish
    Title of host publication6th International Conference on Advanced Computing, ICoAC 2014
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages341-349
    Number of pages9
    ISBN (Electronic)9781479984664
    DOIs
    Publication statusPublished - Aug 28 2015
    Event6th International Conference on Advanced Computing, ICoAC 2014 - Chennai, India
    Duration: Dec 17 2014Dec 19 2014

    Publication series

    Name6th International Conference on Advanced Computing, ICoAC 2014

    Conference

    Conference6th International Conference on Advanced Computing, ICoAC 2014
    Country/TerritoryIndia
    CityChennai
    Period12/17/1412/19/14

    Keywords

    • Access control
    • Attribute based Encryption
    • Authentication
    • Confidentiality
    • Data Outsourcing
    • Integrity
    • Security

    ASJC Scopus subject areas

    • Control and Systems Engineering
    • Artificial Intelligence
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'A survey on security over data outsourcing'. Together they form a unique fingerprint.

    Cite this