Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize the...

Full description

Bibliographic Details
Main Authors: Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
Format: Article
Language:English
Published: MDPI AG 2021-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/21/2721
_version_ 1797512668513304576
author Abdul Razaque
Mohamed Ben Haj Frej
Bandar Alotaibi
Munif Alotaibi
author_facet Abdul Razaque
Mohamed Ben Haj Frej
Bandar Alotaibi
Munif Alotaibi
author_sort Abdul Razaque
collection DOAJ
description Cloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.
first_indexed 2024-03-10T06:04:55Z
format Article
id doaj.art-bb1c23583e8c431986e833ad1a880c00
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T06:04:55Z
publishDate 2021-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-bb1c23583e8c431986e833ad1a880c002023-11-22T20:39:50ZengMDPI AGElectronics2079-92922021-11-011021272110.3390/electronics10212721Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A SurveyAbdul Razaque0Mohamed Ben Haj Frej1Bandar Alotaibi2Munif Alotaibi3Department of Cybersecurity, International Information Technology University, Almaty 050000, KazakhstanDepartment of Computer Science and Engineering, University of Bridgeport, Bridgeport, CT 06604, USADepartment of Information Technology, University of Tabuk, Tabuk 47731, Saudi ArabiaDepartment of Computer Science, Shaqra University, Shaqra 15526, Saudi ArabiaCloud computing has become a prominent technology due to its important utility service; this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.https://www.mdpi.com/2079-9292/10/21/2721cloud computingsecurityservice level agreementprivacy-preserving modelthird-party auditorcloud service provider
spellingShingle Abdul Razaque
Mohamed Ben Haj Frej
Bandar Alotaibi
Munif Alotaibi
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
Electronics
cloud computing
security
service level agreement
privacy-preserving model
third-party auditor
cloud service provider
title Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
title_full Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
title_fullStr Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
title_full_unstemmed Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
title_short Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
title_sort privacy preservation models for third party auditor over cloud computing a survey
topic cloud computing
security
service level agreement
privacy-preserving model
third-party auditor
cloud service provider
url https://www.mdpi.com/2079-9292/10/21/2721
work_keys_str_mv AT abdulrazaque privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey
AT mohamedbenhajfrej privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey
AT bandaralotaibi privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey
AT munifalotaibi privacypreservationmodelsforthirdpartyauditorovercloudcomputingasurvey