A Survey: A Framework to Secure Cloud Data Server Information Using Data Obfuscation

Main Article Content

Juli Chaudhari
Krunal Suthar


Cloud computing provide an high amount of virtual storage to the user. Cloud storage mainly help to small and medium scale industries to reduce their investment and maintenance of storage server.Cloud storage is efficient for data storage. Users’ data are sent to the cloud is to be stored in the public cloud environment. Data stored in the cloud storage might Combined with other users’ data. This will lead to the data protection issue in cloud storage. If the confidentiality of cloud data is broken, then it will cause loss of data to the industry. Security of cloud storage is ensured through confidentiality parameter. To ensure the confidentiality, the most common used technique is encryption. But encryption alone doesn’t give maximum protection to the data in the cloud storage. To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage. Obfuscation is same like encryption. Obfuscation is a process which disguises illegal users by implementing a particular mathematical function or using programming techniques. obfuscation can be applied to a numeric type of data. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized usage. Confidentiality could be achieved with a combination of encryption and obfuscation.

In this paper we survey the current literature on data obfuscation and review current practices as well as applications. We analyse the different obfuscation techniques in relation to protection of software secrets, intellectual property and data. Surprisingly, the same techniques reverse engineers are used.


Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
Juli Chaudhari, JayeshMevada, and Krunal Suthar. “A Survey: A Framework to Secure Cloud Data Server Information Using Data Obfuscation”. Technix International Journal for Engineering Research, vol. 2, no. 5, May 2015, pp. 125-7, https://tijer.org/index.php/tijer/article/view/89.
Research Articles


Dr.L.Arockiam and S.Monikandan ,”Efficient Cloud Storage Confidentiality to Ensure Data Security”2014 International conference on Computer communication and Information(2014 IEEE) ,jan.03-05,2014,coimbatore,India.

Arvind Narayanan and VitalyShamatikov ,“Obfuscated Database and Group Privacy” ,The University of Texas at Austin{arvind,shmat}@cs.utexas.edu,2013.

Christian Collberg,ClarkThomborson,Douglas Low,” A Taxonomy of Obfuscating Transformation ,” Department of computer science ,The University of Auckland, Private Bag 92019 Auckland,New Zealand. {collberg,cthombor,dlow001}@ cs.auckland.ac.nz”2012

Muhammad Hataba and Ahmed EI-Mahdy, “Cloud Protection by Obfuscation :Techniques and Metrics,”2012 IEEE Seventh International conference on P2P,Parallel,Grid,Cloud and Internet Computing,

AtiqurRehman,M.Hussain SZABIST Islamabad Pakistan,”Efficient Cloud Data Confidentiality for DaaS,” International Journal of Advanced Science and Technology Vol.35,october,2011.

PriyankRajvanshi, Varun Singh Nagar, PriyankaChawla ,”Data Protection in Cloud Computing”International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013.

Sergey Vinogradov and AlexandePastsyak,”Evaluation of Data Anonymization Tools”The Fourth International conference on Advances in Database,Knoweldge, and DataApplication ,DBKDA 2012.

S N Dhage, B BMeshram,” Cloud Computing Environment”International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) – TCET,Mumbai, India.

Why Add Data Masking to Your Best Practices for Securing Sensitive Data, Dataguise Inc., Whitepaper, 2009. www.dataguise.com

Data Solutions for Data Privacy, Direct Computer Resources Inc., Whitepaper, June 2010. www.datavantage.com

ShilpashreeSrinivasamurthy and David Q. Liu “Survey on Cloud Computing Security”Department of Computer Science,Indiana University – Purdue University FortWayne,Fort Wayne, IN 46805,2010.

Cloud computing for e-governance. White paper, IIIT-Hyderabad, January 2010. Available online (13 pages).

VidyanandChoudhary. Software as a service: Implications for investment in software development. In HICSS '07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, page 209a, Washington, DC, USA,2007. IEEE Computer Society.

AriniBalakrishnan, Chloe Schulze CS701 Construction of Compilers, Instructor: Charles Fischer,Computer Sciences Department,“Code Obfuscation Literature Survey,” University of Wisconsin, Madison,December 19th, 2005.

Google app engine. http://code.google.com/appengine/.

Christian S. Collberg and Clark Thombor-son. Watermarking, tamper-proofing, andobfuscation - tools for software protection.In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002.