SlideShare a Scribd company logo
A Comprehensive Study of Privacy Preserving
Techniques in Cloud Computing Environment
BANGALORE INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
DATABASE MANAGEMENT SYSTEM-18CS53
Faculty Incharge:
Mrs. Chethana M
Assistant Professor.
Dept. Of Information Science and Engineering
Submitted by:
Sagar Ghosh 1BI20IS073
Sahil Paryani 1BI20IS075
Sathvik K 1BI20IS084
Siddartha V T 1BI20IS108
INTRODUCTION
 Data Privacy has become one of the biggest concerns for both individuals and organizations.
 The huge growth in cloud storage utilization over the past year has made a big demand for an
advanced technique and strong tools.
 This adds more pressure on cloud service providers to gain more trust.
 This paper surveys various privacy-preserving techniques in cloud computing.
 Now we are going to demonstrate on the most innovative and strongest techniques that
researchers has figured out and tested so far.
In Cloud Computing:
 Cloud Computing as defined by NIST “ a model for enabling convenient, on demand network
access to a shared pool of configurable computing resources.
 Eg: Networks, Servers, Storage, Applications.
 Over the years, cloud services have expanded more to catch the interests and demands of the users
with less cost features of its services.
 Users of Cloud like : Normal Individuals , Big Expanding Companies, Governments are all
interested in the modern magic of safeguarding knowledge and information.
Cloud Computing:
LITERATURE SURVEY
 Bayan O Al-Amri, Mohammed A. AlZain, Jehad Al-Amri, Mohammed Baz, Mehedi Masud
College of Computers and Information Technology, Taif University, Saudi Arabia
 Article Info:
Received: 06 December,2019
Accepted: 04 March,2020
 This article focuses on :
1.Cloud Computing
2.Multi Clouds
3.Cloud Storage
4. Privacy Preserving
5. Deep Learning
 In cloud environment, data must be kept secure and safe.
 In today’s world there exist a lot of third-party cloud computing service and support providers of
data, administration for processes, and much more of various needed services in the field.
 Their services yet are not just profitable, but offers even more vulnerabilities to cloud platform.
 Cloud computing systems permit users to execute calculations on a massive quantity of data
without building a whole groundwork from scratch.
 Sending user’s data to the cloud server in the form of plaintext may endanger it to complete
disclosure of data.
Data Breach in Cloud Services:
METHODOLOGY
 One of the mechanism to protect data is hiding data by using specific calculations and algorithms.
Figure 1: Privacy Preserving Techniques.
 We are discussing three current privacy preservation techniques, which are most fascinating.
 1. L-EnCDB Scheme
• L-EnCDB is a novel lightweight encryption mechanism for databases.
• This encryption method is using a format preserving encryption (FPE) scheme proposed with
the L-EnCDB.
• Secret and confidential data are generally encrypted before publishing to clouds for security
necessities.
• This results in a huge demand in practical operational databases.
• Authors proposed this technique by addressing the following results:
 The technique supports practical SQL-based queries.
 Maintaining database structure.
Major Privacy Preserving Techniques:
 The traditional methods of applying security to data used to be by encrypting data with techniques
such as :
public key encryption, and
symmetric key encryption
 Yet they change data types which makes it difficult to use them in database applications for
several operations in SQL such as queries.
 Data extracted through queries cannot be protected if traditional encryption techniques do not
meet the desired measures.
 This gives data owners a mission to both secure data and send them in a changeable form.
 This is why L-EnCDB scheme was suggested. It proposes a trivial encrypted database method
signified by L-EncDB
 This method promises to achieve the necessities discussed beforehand, which are securing data
without changing their format in a database.
 L-EncDB can be successfully executed by using (FPE) technique and character string scheme, this way a
data format can be preserved while in cipher text form.
 FPE enchances security in databases, its mission is to create a cipher text.
 There are two layers in this system:
• The first layer is the application system layer where several encryption methods (FPE,FQE,OPE)
are used in several SQL queries,
• And the interface installed in the database will perform SQL analysis, encrypt, and create cipher texts.
• While the second layer is a database layer which is responsible for permitting developers to only
perform SQL related functions, and also offer data services.
L-EncDB layers:
Security concepts:
 SQL analysis interface is installed at the application layer or user’s side of the system.
 In this system there is expected to be a way to secure the key used in this encryption method.
 Two kind of adversaries that can used with the system’s security:
• Those who target the database, with an attack to encrypted data and a database structure.
• Adversaries who target both the database and system’s applications.
Three SQL operations on cloud:
 L-EncDB is believed to be more practical supporting fuzzy queries in SQL.
 It offers a lighter and easier way to perform operations over data and sharing data securely to
cloud providers.
 It guarantees privacy preserving for queried data from the database, which means securing
valuable data when linking the database to the cloud.
 L-EncDB is suggested as an innovative technique that assures security and privacy preserving
measures for data on cloud databases.
 Making the technique extra efficient it will be going under more examinations.
 In summary, here are some points and remarks regarding every method and some noticeable
highlights, addressed in the following table:
Results:
Conclusion:
 This paper describes the importance of data security and why we need privacy preserving techniques in cloud
computing.
 The paper discusses different surveyed privacy preserving techniques proposed by researchers.
 Summary of the three important techniques are discussed. The cloud computing field is improving and offering
several solutions to serve this goal privacy preserving.
 We believe that this paper will help whom ever has the need to improve further techniques in the privacy
preserving field, to enhance a better yet stronger approaches.
THANK YOU

More Related Content

PDF
Cloud computing and a new approach in data encryption technique
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
Aes based secured framework for cloud databases
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PDF
Cloud Cryptography
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Cloud computing and a new approach in data encryption technique
Improving Data Storage Security in Cloud using Hadoop
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Aes based secured framework for cloud databases
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Cloud Cryptography
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...

Similar to dbms ppt .pptx (20)

PDF
IRJET-Domain Data Security on Cloud
DOCX
Cloud computing term paper
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
Big data security_issues_research_paper
PDF
5.[40 44]enhancing security in cloud computing
PDF
5.[40 44]enhancing security in cloud computing
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
Exploring Cloud Encryption
PDF
U04503119122
PDF
IRJET- Cloud Computing with Encryption
PDF
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PPT
Cryptography Challenges for Computational Privacy in Public Clouds
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-Domain Data Security on Cloud
Cloud computing term paper
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Iaetsd secured and efficient data scheduling of intermediate data sets
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
Big data security_issues_research_paper
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Exploring Cloud Encryption
U04503119122
IRJET- Cloud Computing with Encryption
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
Cryptography Challenges for Computational Privacy in Public Clouds
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Ad

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Construction Project Organization Group 2.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Artificial Intelligence
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Construction Project Organization Group 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mechanical Engineering MATERIALS Selection
Current and future trends in Computer Vision.pptx
Artificial Intelligence
OOP with Java - Java Introduction (Basics)
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
R24 SURVEYING LAB MANUAL for civil enggi
Operating System & Kernel Study Guide-1 - converted.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Automation-in-Manufacturing-Chapter-Introduction.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Ad

dbms ppt .pptx

  • 1. A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment BANGALORE INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING DATABASE MANAGEMENT SYSTEM-18CS53 Faculty Incharge: Mrs. Chethana M Assistant Professor. Dept. Of Information Science and Engineering Submitted by: Sagar Ghosh 1BI20IS073 Sahil Paryani 1BI20IS075 Sathvik K 1BI20IS084 Siddartha V T 1BI20IS108
  • 2. INTRODUCTION  Data Privacy has become one of the biggest concerns for both individuals and organizations.  The huge growth in cloud storage utilization over the past year has made a big demand for an advanced technique and strong tools.  This adds more pressure on cloud service providers to gain more trust.  This paper surveys various privacy-preserving techniques in cloud computing.  Now we are going to demonstrate on the most innovative and strongest techniques that researchers has figured out and tested so far. In Cloud Computing:
  • 3.  Cloud Computing as defined by NIST “ a model for enabling convenient, on demand network access to a shared pool of configurable computing resources.  Eg: Networks, Servers, Storage, Applications.  Over the years, cloud services have expanded more to catch the interests and demands of the users with less cost features of its services.  Users of Cloud like : Normal Individuals , Big Expanding Companies, Governments are all interested in the modern magic of safeguarding knowledge and information. Cloud Computing:
  • 4. LITERATURE SURVEY  Bayan O Al-Amri, Mohammed A. AlZain, Jehad Al-Amri, Mohammed Baz, Mehedi Masud College of Computers and Information Technology, Taif University, Saudi Arabia  Article Info: Received: 06 December,2019 Accepted: 04 March,2020  This article focuses on : 1.Cloud Computing 2.Multi Clouds 3.Cloud Storage 4. Privacy Preserving 5. Deep Learning
  • 5.  In cloud environment, data must be kept secure and safe.  In today’s world there exist a lot of third-party cloud computing service and support providers of data, administration for processes, and much more of various needed services in the field.  Their services yet are not just profitable, but offers even more vulnerabilities to cloud platform.  Cloud computing systems permit users to execute calculations on a massive quantity of data without building a whole groundwork from scratch.  Sending user’s data to the cloud server in the form of plaintext may endanger it to complete disclosure of data. Data Breach in Cloud Services:
  • 6. METHODOLOGY  One of the mechanism to protect data is hiding data by using specific calculations and algorithms. Figure 1: Privacy Preserving Techniques.
  • 7.  We are discussing three current privacy preservation techniques, which are most fascinating.  1. L-EnCDB Scheme • L-EnCDB is a novel lightweight encryption mechanism for databases. • This encryption method is using a format preserving encryption (FPE) scheme proposed with the L-EnCDB. • Secret and confidential data are generally encrypted before publishing to clouds for security necessities. • This results in a huge demand in practical operational databases. • Authors proposed this technique by addressing the following results:  The technique supports practical SQL-based queries.  Maintaining database structure. Major Privacy Preserving Techniques:
  • 8.  The traditional methods of applying security to data used to be by encrypting data with techniques such as : public key encryption, and symmetric key encryption  Yet they change data types which makes it difficult to use them in database applications for several operations in SQL such as queries.  Data extracted through queries cannot be protected if traditional encryption techniques do not meet the desired measures.  This gives data owners a mission to both secure data and send them in a changeable form.  This is why L-EnCDB scheme was suggested. It proposes a trivial encrypted database method signified by L-EncDB  This method promises to achieve the necessities discussed beforehand, which are securing data without changing their format in a database.
  • 9.  L-EncDB can be successfully executed by using (FPE) technique and character string scheme, this way a data format can be preserved while in cipher text form.  FPE enchances security in databases, its mission is to create a cipher text.
  • 10.  There are two layers in this system: • The first layer is the application system layer where several encryption methods (FPE,FQE,OPE) are used in several SQL queries, • And the interface installed in the database will perform SQL analysis, encrypt, and create cipher texts. • While the second layer is a database layer which is responsible for permitting developers to only perform SQL related functions, and also offer data services. L-EncDB layers:
  • 11. Security concepts:  SQL analysis interface is installed at the application layer or user’s side of the system.  In this system there is expected to be a way to secure the key used in this encryption method.  Two kind of adversaries that can used with the system’s security: • Those who target the database, with an attack to encrypted data and a database structure. • Adversaries who target both the database and system’s applications.
  • 12. Three SQL operations on cloud:
  • 13.  L-EncDB is believed to be more practical supporting fuzzy queries in SQL.  It offers a lighter and easier way to perform operations over data and sharing data securely to cloud providers.  It guarantees privacy preserving for queried data from the database, which means securing valuable data when linking the database to the cloud.  L-EncDB is suggested as an innovative technique that assures security and privacy preserving measures for data on cloud databases.  Making the technique extra efficient it will be going under more examinations.
  • 14.  In summary, here are some points and remarks regarding every method and some noticeable highlights, addressed in the following table: Results:
  • 15. Conclusion:  This paper describes the importance of data security and why we need privacy preserving techniques in cloud computing.  The paper discusses different surveyed privacy preserving techniques proposed by researchers.  Summary of the three important techniques are discussed. The cloud computing field is improving and offering several solutions to serve this goal privacy preserving.  We believe that this paper will help whom ever has the need to improve further techniques in the privacy preserving field, to enhance a better yet stronger approaches.