Security and Privacy in the Context of the Public Clouds
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials or authorization policies change. Data owners thus incur high communication and computation costs. In order to minimize the overhead at the data owners, while assuring data confidentiality from the cloud, a better approach should be implemented to enforce the secured access control to cloud. We propose an approach, based on two layers of encryption that addresses such requirement. Under this approach, the data owner performs a one layer encryption, and whereas the cloud performs a second layer of encryption on top of the owner encrypted data. We use an effective group key management scheme for encryptions. Our approach provides secrecy of the data and maintains the privacy of the user from the cloud while accessing the cloud.
Authors and Affiliations
Chikkam Naga Venkata Prakash, Sudhir Varma Sagiraju
A Survey on Greedy Reconstruction Algorithms in Compressive Sensing
Compressive sensing (CS) is a field of signal processing that provides a framework for image recovery using sub-Nyquist sampling rates. CS has recently gained a lot of attention due to its exploitation of signal sparsit...
The Image Analysis In Web Facial Images For Pursuit Face Annotation
Face annotation means giving the name to the picture which is in the photo. Auto face annotation is assuming pressing part in numerous true applications, for example, genuine administration frameworks and sight and s...
Safety Defending Delegated Admittance Mechanism in Public Clouds
Cloud computing, as a rising registering standard. Cloud computing empowers clients to remotely store their information in a cloud furthermore profit by administrations on-interest. With fast improvement of cloud com...
Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...