Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image
ABSTARCT :
The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be seriously treated, yet is largely overlooked in the literature. To address this issue, we propose the first cloud service framework that can simultaneously provide privacy protection and content regulation for the cloud storage image. In specific, we design a secure multi-party computation (MPC) protocol to protect the data privacy via random projection. By leveraging the distance preserving properties residing in random projection, we propose a privacy-preserving principal component analysis (PCA)-based recognition approach over the random projection domain to achieve content matching while respecting the data privacy. To facilitate the efficiency, we implement our system under the compressive sensing (CS) framework. Due to the compression effect of CS, the proposed cloud service can achieve remarkable reduction on the computation and communication complexity of the content matching process. Theoretical analysis and experimental results both show that our system can achieve privacy assurance and acceptable recognition performance, while with high efficiency.
EXISTING SYSTEM :
? This paper discusses about the challenges, advantages and shortcomings of existing solutions in data security and privacy in public cloud computing.
? Data security and privacy issues in cloud exist during the data life cycle from generation, transfer, use, share, storage, archival until destruction.
? The corruption of single piece of data would lead to the corruption of the entire file, additional backups are needed. Tradeoff between confidentiality and availability exists.
? This paper focuses on the data storage and computation security and privacy. Different methods are compared, problems and advantages with the existing methods are discussed.
DISADVANTAGE :
? Complex encryption algorithms are not friendly resources-limited users, so it is a practical problem to ensure that they can operate on their own devices.
? To solve this problem, the concept of revocable storage is proposed, which support both key revocation and ciphertext update.
? Policy-compacting fundamentally solves the problem of ciphertext redundancy caused by the large scale of policy, which is of great significance to improve the performance of Abe scheme.
? In order to solve this problem, the combination of ABE and IBE can not only obtain fine-grained access control, but also reduce the computation and communication cost during decrypting prase.
PROPOSED SYSTEM :
• A data security and privacy enabled multi-cloud architecture is proposed.
• The splitting algorithm proposed is not efficient, instead dynamic programming could be used.
• In, a Trusted Cloud Computing Platform (TCCP) based on trusted computing is proposed to protect confidentiality and integrity.
• A hierarchical multi-cloud architecture with a common preprocessing API and local database to deal with anonymization, authentication, processing data with different operations and secret level is proposed.
• The proposed architecture could provide various security methods according to the data type and usage to reduce the complexity by calling a common API.
ADVANTAGE :
? Due to the high performance, scalable and reliable datacenters of the cloud, many of the smart city applications and services will be hosted in the Cloud.
? Cloud is not only the destination of workload, but also provides efficient operation practice, which makes enterprises have higher agility and flexibility.
? The advantages of cloud storage include unlimited data storage space, convenient, safe and efficient file accessibility and offsite backup, and low cost of use.
? ABE allows the data owner to use the user’s attributes as a medium to specify the legitimate users, and obtains high-efficiency fine-grained access control functionality.
|