International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 262

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.3 / 10


     

Survey on Privacy Preserving and Data Security Techniques

Pramila Kharat, Amar Buchade


Abstract: In day to day life cloud computing is most promising and widely used technology. As it provides infrastructure, platform and software as a service, it is used in almost all area of computing. We use cloud for data storage, data processing and computing purpose. In return we pay to cloud for using its resources. Here user is not sure whether his data is in safe hands as well as his identity is reveled with his data. In this Survey paper we enlist all the research carried out related to data security and users privacy preserving techniques in detail. Finally we proposed system which provides data ownership privacy using token generation for each user, each session and data security using RSA.


Keywords: Cloud Computing, security, Privacy, Data Ownership


Edition: Volume 4 Issue 7, July 2015


Pages: 1912 - 1916



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pramila Kharat, Amar Buchade, "Survey on Privacy Preserving and Data Security Techniques", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1912-1916, https://www.ijsr.net/getabstract.php?paperid=SUB156866, DOI: https://www.doi.org/10.21275/SUB156866

Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article



Top