• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Privacy-Preserving Public Auditing In Cloud Storage Security

by D. Srinivas
Add To MetaCart

Tools

Sorted by:
Results 1 - 4 of 4

Privacy Preserving Information Brokering for Data Handling Frameworks

by unknown authors
"... Abstract: In recent year’s organizations heave rising require for data imparting through on-interest access. Data handling frameworks have been proposed to associate vast scale inexactly unified information sources through a facilitating overlay, in which the intermediaries settle on steering choice ..."
Abstract - Add to MetaCart
Abstract: In recent year’s organizations heave rising require for data imparting through on-interest access. Data handling frameworks have been proposed to associate vast scale inexactly unified information sources through a facilitating overlay, in which the intermediaries settle on steering choices to regulate customer questions to the asked for information servers. Numerous existing data handling frameworks expect that agents are trusted and accordingly just embrace server-side access control for information privacy. Notwithstanding, security of information area and informed buyer can even now be derived from metadata, (for example, inquiry and access control guidelines) traded inside the DHS, yet little consideration has been put on its assurance. In this paper, we propose a novel methodology to save protection of numerous stakeholders included in the data expediting procedure. We are among the first to formally characterize two security attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure plans automaton segmentation and query segment encryption to safely impart the directing choice making obligation among a chose set of expediting servers. With extensive security investigation and trial results, we indicate that our methodology flawlessly incorporates the security requirement with question steering to give framework wide security with inconsequential overhead. Key Terms—Access control, data offering, Privacy Preserving information brokering, Automaton segmentation, Commutative encryption ©IJCERT 85 | P a g e

A Survey on Privacy Preservation in Cloud Computing

by Gurudayal Singh Bhandari, Abhishek Chauhan
"... Abstract — By integrating multiple private and public cloud services, hybrid clouds can effectively provide dynamic scalability of service and data migration. Security plays a vital during the transmission of data from the sender to the receiver in any environment. The challenge in privacy preservin ..."
Abstract - Add to MetaCart
Abstract — By integrating multiple private and public cloud services, hybrid clouds can effectively provide dynamic scalability of service and data migration. Security plays a vital during the transmission of data from the sender to the receiver in any environment. The challenge in privacy preserving Back-Propagation Neural Network Learning is avoiding the attack of personal data privacy. Due to the enlargement of distributed computing environment. In such distributed scenarios, privacy concerns often become a big concern. Secure computation provides a solution to this problem. With the invention of new technologies, Computing, it has been more convenient than ever for users across the Internet, who may not even know each other, whether it is data mining, in databases or in any networks, resolving privacy problems has become very important.
(Show Context)

Citation Context

...scenario, where the TPA can perform multiple auditingstasks in a batch manner for better effectiveness. Extensivesexamination shows that these schemes are almostscertainly secure and highly efficient =-=[8]-=-.sThe Cloud security responsibilities can be taken on bysthe customer, if he is managing the cloud, but in the casesof a public cloud, such responsibilities are more on thescloud provider and the cust...

A review on Security in Distributed Information Sharing

by Swati Upadhyay, Prof J P Maurya
"... Abstract — In recent year’s privacy preserving data mining has emerged as a very active research area in data mining. Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining. More precisely, it became clear that discovering knowledge through ..."
Abstract - Add to MetaCart
Abstract — In recent year’s privacy preserving data mining has emerged as a very active research area in data mining. Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining. More precisely, it became clear that discovering knowledge through a combination of different databases raises important security issues. Privacy preserving data mining is one of the most demanding research areas within the data mining community. In many cases, multiple parties may wish to share aggregate private data, without disclosing sensitive information at their end. In this we are discussing some techniques related to security and privacy preservation of information and its sharing.
(Show Context)

Citation Context

...s of the same set of file blocksscan be together. Besides the correctness justification of thesblock authenticator pairs can still be carried out in a newsway even with the presence of the randomness =-=[7]-=-. Withsthe establishment of privacy- preserving public auditing,sthe TPA may at the same time as handle numerous auditingsupon different users entrustment. The individual auditingsof these assignments...

Capacity Management for Virtualized Data Centers using ECIES and Scheduling

by Anil Kumar Raghuwanshi, Kavita Burse Ph. D
"... With the growth Internet development cloud computing is novel technique to serve better and secure services. E-business is growing rapidly with the development of Internet. The cloud computing provides on demand self service methodology that authorizes users to request resources dynamically as a bes ..."
Abstract - Add to MetaCart
With the growth Internet development cloud computing is novel technique to serve better and secure services. E-business is growing rapidly with the development of Internet. The cloud computing provides on demand self service methodology that authorizes users to request resources dynamically as a best benefit. The use of Cloud Computing is ahead reputation due to its mobility and massive availability in minimum cost. Here in this paper an efficient Capacity Management of user‟s data on datacenters is proposed using attribute and scheduling techniques. The proposed technique provides much efficient use of Virtualized data as compared to the existing technique.
(Show Context)

Citation Context

...lity. This is done whensclients cannot perform computation resources that performscontinuous verifications [5]. But to be considered individualsauditing of TPA also is tiresome and lack in efficiency =-=[6]-=-. Inscloud environment the clients are sometimes unreliable andsthe overhead of performing frequent truthfulness verificationsis unaffordable for the clients. Considering the realistic use ofsthe tech...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University