Privacy Preserving using PAM in Cloud Computing

Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 3

Abstract

The cloud user can remotely access software, services, application whenever they require over the internet. The user can put their data remotely to the cloud storage. So, It is necessary that the cloud must have to ensure data integrity and privacy of data of user. The security is the major issue about cloud computing. The user may feel insecure for storing the data in cloud storage. To overcome this issue, here we are giving public auditing mechanism for cloud storage. For this, we studied Oruta system that providing public auditing mechanism. Revocation is all about the problems with security occur in system. And we are revoked these many problems from the system. We are also revoking existing members and adding new members in a group. In this way, we overcome the problem of static group. In this system, TPA is Third Party Auditor which maintains all the log credentials of user and it verifies the proof of data integrity and identity privacy of user. So, TPA plays a very important role in our system. Here we defining statement of our model as,“Privacy Preserving using PAM in Cloud Computing ”.

Authors and Affiliations

Keywords

Related Articles

Carpooling Using Genetic Algorithm

Now a day’s traffic congestion is a main issue all over the world so we are proposing a carpool system that will increase the no of occupation seats by decreasing the no of empty seats. In carpooling, drivers share their...

Glaucoma Screening Based On Super pixel Classification

Glaucoma is a chronic eye disease in which the optic nerve head is progressively damaged which leads to loss of vision. Early diagnosis and treatment is the key to preserving sight in people with glaucoma. Current tests...

Tuning of a Feedforward Lag-Lead First-Order Compensator used with a Fractional Time Delay Double Integrating Process

The problem of controlling an unstable delayed double integrating process with fractional delay using a feed forward first-order lag-lead compensator is studied. The effect of time delay of the process in a range between...

Confidential DoS-Resistant Code Update Protocol in WSN

Wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes. WSNs are widely applicable in monitoring and control of environmental parameters such as temperatures, sound, pressure, etc. Sensor...

Receiver Initiated Asynchronous Duty-Cycle MAC protocol For Burst Traffic

Many energy-efficient Receiver Initiated Asynchronous Duty-Cycle MAC protocol for wireless sensor networks (WSNs) have been proposed. Most nodes suffer from significant performance Degradation for burst traffic, due to r...

Download PDF file
  • EP ID EP354627
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

(2015). Privacy Preserving using PAM in Cloud Computing. International Journal of Engineering and Techniques, 1(3), 10-13. https://europub.co.uk/articles/-A-354627