Downloads: 104 | Views: 310
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.4 / 10
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Abstract: Cloud computing offers well-known services for storing user data and it gives attention towards a broad set of policies, technologies and controls deployed to facilitate security for applications and data. As the more and more businesses using the cloud, security is becoming main problem in the cloud environment. It is very important that companies work with partners who knows best practices of cloud security and which provides transparency for their solutions. Many security solutions today rely on the authentication for providing security but it didn-t solve the privacy issues while sharing data over the cloud storage. Users data access request itself may reveal users private information no matter his request approved or not. So this become the important in data sharing in the cloud computing. In this paper we proposed a system which addresses the above mentioned issue. The proposed system uses the concept of data anonymity for anonymous matching of data access request. Our system also provides the data auditing functionality to protect the integrity of users shared data.
Keywords: Cloud computing, data anonymity, user privacy, data integrity, security
Edition: Volume 4 Issue 5, May 2015
Pages: 1845 - 1848
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad