Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Review on Privacy-Preserving in Cloud Computing

Print
PDF
IJCA Proceedings on International Conference on Advances in Science and Technology
© 2015 by IJCA Journal
ICAST 2014 - Number 3
Year of Publication: 2015
Authors:
Jeur Nagaraj S
Pavan Kumar

Jeur Nagaraj S and Pavan Kumar. Article: Review on Privacy-Preserving in Cloud Computing. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2014(3):23-26, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Jeur Nagaraj S and Pavan Kumar},
	title = {Article: Review on Privacy-Preserving in Cloud Computing},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2015},
	volume = {ICAST 2014},
	number = {3},
	pages = {23-26},
	month = {February},
	note = {Full text available}
}

Abstract

Cloud computing is emerging technology. Cloud offers several applications to users. Cloud computing use the basic fundamental infrastructure is help full for coming model of service that has the several benefit of decreasing cost by sharing computing and storage resources. Without appropriate privacy solution for cloud become a large failure. There is a lot of research techniques made to provide security. Privacy means that the person to be free from all interference. Privacy control allows the person to maintain a degree of intimacy. Privacy is the protection for the truthful use of personal information of cloud user. Privacy problems have become very challenge one in an cloud computing environment. So we use several techniques to protect the confidentiality data.

References

  • CLOUD COMPUTING TUTORIAL Simply Easy Learning by tutorialspoint. com tutorialspoint
  • B. Sujana1, P. Tejaswini2, G. Srinivasulu3, Sk. Karimulla4 "Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking" Volume 2, Issue 2, March – April 2013
  • Divyakant Agrawal Amr El Abbadi Shiyuan Wang "Secure and privacy preserving data Centric View.
  • M. Suriyapriya1, A. Joicy2 "Attribute Based Encryption with Privacy Preserving In Clouds" Volume: 2 Issue: 2
  • Neethu Mariam Joseph,Esther Daniel,N. A. Vasanthi "Survey on Privacy-Preserving Methods for Storage in Cloud Computing" (IJCA) (AICWIC'13)
  • T. Jothi Neela1* and N. Saravanan2 Vasanthi " Privacy Preserving Approaches in Cloud: a Survey" IJST
  • Zhou M, Mu Y et al. (2011). "Privacy-Preserved Access Control 3. for Cloud Computing", International Joint Conference of IEEE TrustCom-11/IEEE ICESS- 11/FCST-11, 83–90.
  • B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy, V. PoornaChandar "CP-ABE Based Encryption for Secured Cloud Storage Access". Volume 3, Issue 9, September-2012 ISSN 2229- 5518
  • Bethencourt, J. , Sahai, A. , Waters, B. : "Ciphertext- policy attribute-based encryption". IEEE Symposium on Security and Privacy, 2007
  • Takabi H (2010). "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy, vol 8(6), 24–31