Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Computing
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 2
Abstract
With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing scheme is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems such as the Electronic Health Records EHRs system, the cloud file might contain some sensitive information. The sensitive information should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still has not been explored up to now. In order to address this problem, we propose a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding in this system. Paruvathavarthini M | Prasuna K S | Sermakani. A. M ""Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30007.pdf Paper Url : https://www.ijtsrd.com/engineering/information-technology/30007/data-sharing-with-sensitive-information-hiding-in-data-storage-using-cloud-computing/paruvathavarthini-m
Authors and Affiliations
Paruvathavarthini M | Prasuna K S | Sermakani. A. M
Oblong Mean Prime Labeling of Some Tree Graphs
The labeling of a graph, we mean assign some integers to the vertices or edges (or both) of the graph. Here the vertices of the graph are labeled with oblong numbers and the edges are labeled with mean of the end vertex...
A Literature Survey on Security Management Policies used in Wireless Domain
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion...
An Enhanced Feature Selection Method to Predict the Severity in Brain Tumor
The level of severity of brain tumor is captured through MRI and then assessed by the physician for their medical interpretation. The facts behind the MRI images are then analyzed by the physician for further medication...
Teachers' Knowledge, Understanding, Ability and Implementation of Competency Based Approach in the Teaching of Geography in Secondary Grammar Schools in the South West Region of Cameroon
This paper was designed to assess whether the adoption of Competence Based Approach CBA to improve the quality of secondary education in Cameroon is a dream or reality. Resistance to change and reluctance to implement na...
Determinants of Agricultural Innovations Adoption among Cooperative and Non Cooperative Farmers in Imo State Nigeria
This study examined the determinants of agricultural innovations adoption among cooperative and non cooperative farmers in Imo State, Nigeria. The research design used in this study is descriptive survey research design....