Computer Science &Amp; Information Technology (CS &Amp; IT) 2012
DOI: 10.5121/csit.2012.2331
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in Cloud Computing : A Survey

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The cloud user should carefully read the privacy policy before placing their informat ion in the cloud. If a cloud user doesn't understand any of the policies, it should be clarified with the provider or may consider other service providers [23]. Cloud user must have a close attention regarding rights to use, disclose, or make public cloud user information.…”
Section: A For Cloud Usermentioning
confidence: 99%
“…The cloud user should carefully read the privacy policy before placing their informat ion in the cloud. If a cloud user doesn't understand any of the policies, it should be clarified with the provider or may consider other service providers [23]. Cloud user must have a close attention regarding rights to use, disclose, or make public cloud user information.…”
Section: A For Cloud Usermentioning
confidence: 99%
“…[10]. In CP-ABE, the attributes are associated the access structure and the secret key is associated with the ciphertext and it is for this reason, that this scheme is called the Ciphertext-Policy Attribute Based Encryption [5].…”
Section: Ciphertext Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…Thus, the roles determined the user's access to the system on the basis of the job role. Roles were assigned to the user based on the concept of least privileges, i.e., the role is assigned with the least amount of permissions required for the job to be done [10]. If, at any time, the privileges for a role changed, then it was possible to add or delete the permissions.…”
Section: Role Based Access Control (Rbac)mentioning
confidence: 99%
“…In which first Client Based Privacy manager [7] Privacy preserving Repository [12] Preventing information leakage from indexing [10] Privacy preserving in cloud [8] Homomorphic encryption [9] Elliptic curve cryptograph y [18] Privacy preserving public auditing [19] Public Auditability and data dynamics [11] Privacy preserved access control [14] Privacy preserving system [13] RC5 algorit hm [15] Keeping data private while computing [17] Fog Computing [16] Privacy preserving public auditing [20] Privacy preserving Repository [12] Service oriented identity authentication privacy [21] phase consist of sigGen and the keyGen algorithm which verify the metadata while the second phase consist of genproof and verify proof algorithm for auditing. Audit report gives the harm present in the data [30].The next paper is an extension to this paper with little bit of improvement in this paper.…”
Section: Privacy Preserving Public Auditing For Storage Securitymentioning
confidence: 99%