Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Computing

Abstract

With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing scheme is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems such as the Electronic Health Records EHRs system, the cloud file might contain some sensitive information. The sensitive information should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still has not been explored up to now. In order to address this problem, we propose a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding in this system. Paruvathavarthini M | Prasuna K S | Sermakani. A. M ""Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30007.pdf Paper Url : https://www.ijtsrd.com/engineering/information-technology/30007/data-sharing-with-sensitive-information-hiding-in-data-storage-using-cloud-computing/paruvathavarthini-m

Authors and Affiliations

Paruvathavarthini M | Prasuna K S | Sermakani. A. M

Keywords

Related Articles

Oblong Mean Prime Labeling of Some Tree Graphs

The labeling of a graph, we mean assign some integers to the vertices or edges (or both) of the graph. Here the vertices of the graph are labeled with oblong numbers and the edges are labeled with mean of the end vertex...

A Literature Survey on Security Management Policies used in Wireless Domain

Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion...

An Enhanced Feature Selection Method to Predict the Severity in Brain Tumor

The level of severity of brain tumor is captured through MRI and then assessed by the physician for their medical interpretation. The facts behind the MRI images are then analyzed by the physician for further medication...

Teachers' Knowledge, Understanding, Ability and Implementation of Competency Based Approach in the Teaching of Geography in Secondary Grammar Schools in the South West Region of Cameroon

This paper was designed to assess whether the adoption of Competence Based Approach CBA to improve the quality of secondary education in Cameroon is a dream or reality. Resistance to change and reluctance to implement na...

Determinants of Agricultural Innovations Adoption among Cooperative and Non Cooperative Farmers in Imo State Nigeria

This study examined the determinants of agricultural innovations adoption among cooperative and non cooperative farmers in Imo State, Nigeria. The research design used in this study is descriptive survey research design....

Download PDF file
  • EP ID EP685949
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Paruvathavarthini M, Prasuna K S (2020). Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Computing. International Journal of Trend in Scientific Research and Development, 4(2), -. https://europub.co.uk/articles/-A-685949