2013
DOI: 10.1007/978-3-642-37949-9_44
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Representation for Web Service Communicators’ in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…ST, if and only if ST n = ST 1 *ST 2 *ST 3 , STn be always true, otherwise TR pi = E x S pi is validated, and authentication process starts from SRi➔{TR pi , P si , E x , S pi }. After all these truncation process, if any request gets passed with returning a true value, ‘R q ’ the service requestors are allowed or recognized as authenticated user to view the stored data and information .…”
Section: Proposed Working Model and Experimental Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…ST, if and only if ST n = ST 1 *ST 2 *ST 3 , STn be always true, otherwise TR pi = E x S pi is validated, and authentication process starts from SRi➔{TR pi , P si , E x , S pi }. After all these truncation process, if any request gets passed with returning a true value, ‘R q ’ the service requestors are allowed or recognized as authenticated user to view the stored data and information .…”
Section: Proposed Working Model and Experimental Methodologymentioning
confidence: 99%
“…Permitting requested users by limiting their accessibility and secrecy priority. Reiterate whole method for accessing cloud data storage area and allocate confidential information to the correct user . In Figures and , current progression works under the umbrella of algorithm stated in the succeeding text, and these steps follow continuously until the user gets identified with their original data kept more confidentially.…”
Section: Proposed Working Model and Experimental Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…It is noted to be less cost effective process for implementing in many field whereever privacy is necessity. [6][7][8][9], The general behavior proposed in this approach experiments a better data utility option with improved privacy preserving technique. Once all information readily available online one can easily get into others storage without any risk and makes the data into risk and there is no information privacy in it.…”
Section: Introductionmentioning
confidence: 99%
“…[1][2][3][4] author et al proposed a privacy preserving approach for mitigating the security for user data using encryption and decryption technique, a Petri-net based framework approach to preserve user information, and an evolutionary model for protecting digital data. [6], [29][30][31] cloud service privacy representation to ensure the trust in cloud providers. An intelligent model based hybrid approach to preserve user digital content, pervasive and ubiquitous computing environment privacy preservation carried out, and a generic approach to molt the assurance of secrecy in maintain cloud digital data.…”
Section: Introductionmentioning
confidence: 99%