International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 330

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.5 / 10


     

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao


Abstract: Cloud computing is continuously developing as a standard for sharing the data over the remote storage in an online cloud server. Cloud services offers great amenities for the users to enjoy the on-demand cloud applications without any obligations related to data. During the data retrieving, different users may be in a cooperative relationship, and hence data distribution becomes important. Though the users data is not accessed by unwanted sources, the others data is exposed to risk by request for sharing. Hence privacy criteria for an user is at risk as access request tends to expose all the information. In this paper, we have studied privacy-preserving authentication protocol (SAPA) to address the mentioned privacy issue for cloud storing and also trying to address to the efficiency increased by this SAPA protocol. It also designates that the proposed protocol realizing privacy-preserving data access authority sharing is most promising for multi-user collaborative cloud applications. The study and the research let us to focus on Trusted Third party mechanism. Trusted third party seems the effective measure to make sure the authentication and authorization is done with minimum interactions with cloud server.


Keywords: Cloud Computing, Data Privacy, Security, Trusted Third Party


Edition: Volume 4 Issue 11, November 2015


Pages: 1724 - 1727



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
P. Vanitha Sree, K. Narayana Rao, "Privacy Preserving Authenticity Framework for Shared Data Cloud Network", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1724-1727, https://www.ijsr.net/getabstract.php?paperid=SUB159014

Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top