Downloads: 109 | Views: 330
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.5 / 10
Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
Abstract: Cloud computing is continuously developing as a standard for sharing the data over the remote storage in an online cloud server. Cloud services offers great amenities for the users to enjoy the on-demand cloud applications without any obligations related to data. During the data retrieving, different users may be in a cooperative relationship, and hence data distribution becomes important. Though the users data is not accessed by unwanted sources, the others data is exposed to risk by request for sharing. Hence privacy criteria for an user is at risk as access request tends to expose all the information. In this paper, we have studied privacy-preserving authentication protocol (SAPA) to address the mentioned privacy issue for cloud storing and also trying to address to the efficiency increased by this SAPA protocol. It also designates that the proposed protocol realizing privacy-preserving data access authority sharing is most promising for multi-user collaborative cloud applications. The study and the research let us to focus on Trusted Third party mechanism. Trusted third party seems the effective measure to make sure the authentication and authorization is done with minimum interactions with cloud server.
Keywords: Cloud Computing, Data Privacy, Security, Trusted Third Party
Edition: Volume 4 Issue 11, November 2015
Pages: 1724 - 1727
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad