@article{scholars12116, title = {Layer-based privacy and security architecture for cloud data sharing}, doi = {10.24138/jcomss.v15i2.617}, number = {2}, note = {cited By 21}, volume = {15}, pages = {173--185}, publisher = {University of Split}, journal = {Journal of Communications Software and Systems}, year = {2019}, issn = {18456421}, author = {Gupta, I. and Singh, N. and Singh, A. K.}, abstract = {The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider for applying security over each document and then transfer it to the client, we proposed a layered architecture. This approach maintains security of the sensitive document and privacy of its data sensitivity. To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity. Perseverance of various categories require different algorithmic schemes. We set up a cloud distributed environment where data is categorized into four levels of sensitivity: public, confidential, secret, top secret and a different approach has been used to preserve the security at each level. At the most sensitive layers i.e. secret and top secret data, we made a provision to detect the faulty node that is responsible for data leakage. Finally, experimental analysis is carried out to analyze the performance of the layer-based approach. The experimental results show that time taken (in ms) in processing 200 documents of size 20 MB is 437, 2239, 3142, 3900 for public, confidential, secret, and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach. {\^A}{\copyright} 2019 CCIS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85068449378&doi=10.24138\%2fjcomss.v15i2.617&partnerID=40&md5=1ead64241574ff2322a9918d8ec92e25} }