CFP last date
20 December 2024
Reseach Article

Review on Privacy-Preserving in Cloud Computing

Published on February 2015 by Jeur Nagaraj S, Pavan Kumar
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2014 - Number 3
February 2015
Authors: Jeur Nagaraj S, Pavan Kumar
ae06b37b-adc7-4245-a02d-6712d97c3151

Jeur Nagaraj S, Pavan Kumar . Review on Privacy-Preserving in Cloud Computing. International Conference on Advances in Science and Technology. ICAST2014, 3 (February 2015), 23-26.

@article{
author = { Jeur Nagaraj S, Pavan Kumar },
title = { Review on Privacy-Preserving in Cloud Computing },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2015 },
volume = { ICAST2014 },
number = { 3 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 23-26 },
numpages = 4,
url = { /proceedings/icast2014/number3/19488-5037/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Jeur Nagaraj S
%A Pavan Kumar
%T Review on Privacy-Preserving in Cloud Computing
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2014
%N 3
%P 23-26
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is emerging technology. Cloud offers several applications to users. Cloud computing use the basic fundamental infrastructure is help full for coming model of service that has the several benefit of decreasing cost by sharing computing and storage resources. Without appropriate privacy solution for cloud become a large failure. There is a lot of research techniques made to provide security. Privacy means that the person to be free from all interference. Privacy control allows the person to maintain a degree of intimacy. Privacy is the protection for the truthful use of personal information of cloud user. Privacy problems have become very challenge one in an cloud computing environment. So we use several techniques to protect the confidentiality data.

References
  1. CLOUD COMPUTING TUTORIAL Simply Easy Learning by tutorialspoint. com tutorialspoint
  2. B. Sujana1, P. Tejaswini2, G. Srinivasulu3, Sk. Karimulla4 "Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking" Volume 2, Issue 2, March – April 2013
  3. Divyakant Agrawal Amr El Abbadi Shiyuan Wang "Secure and privacy preserving data Centric View.
  4. M. Suriyapriya1, A. Joicy2 "Attribute Based Encryption with Privacy Preserving In Clouds" Volume: 2 Issue: 2
  5. Neethu Mariam Joseph,Esther Daniel,N. A. Vasanthi "Survey on Privacy-Preserving Methods for Storage in Cloud Computing" (IJCA) (AICWIC'13)
  6. T. Jothi Neela1* and N. Saravanan2 Vasanthi " Privacy Preserving Approaches in Cloud: a Survey" IJST
  7. Zhou M, Mu Y et al. (2011). "Privacy-Preserved Access Control 3. for Cloud Computing", International Joint Conference of IEEE TrustCom-11/IEEE ICESS- 11/FCST-11, 83–90.
  8. B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy, V. PoornaChandar "CP-ABE Based Encryption for Secured Cloud Storage Access". Volume 3, Issue 9, September-2012 ISSN 2229- 5518
  9. Bethencourt, J. , Sahai, A. , Waters, B. : "Ciphertext- policy attribute-based encryption". IEEE Symposium on Security and Privacy, 2007
  10. Takabi H (2010). "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy, vol 8(6), 24–31
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Component Privacy-preserving Methods Privacy-preserving Algorithms.