Visible to the public An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing

TitleAn Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
Publication TypeConference Paper
Year of Publication2018
AuthorsAgarkhed, Jayashree, R, Ashalatha., Patil, Siddarama R.
Conference NameProceedings of the 2Nd International Conference on Future Networks and Distributed Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6428-7
Keywordsattribute encryption, cloud, cloud computing, cloud proxy server, data storage, encryption audits, Metrics, privacy preserving, pubcrawl, public auditing, resilience, Resiliency, Scalability, trusted authority, user privacy, user privacy in the cloud
Abstract

Cloud computing belongs to distributed network technology for computing and storage capabilities purpose. It is a kind of cost-effective technology dedicated to information technology. Using the Internet, the accessibility and retrieving of cloud data have become much more accessible. The service providers can expand the storage space in a cloud environment. Security is well-thought-out to be the essential attribute in a distributed system. Cryptography can be described as a method of securing the data from attackers and eavesdroppers. Third Party Auditor is responsible for the authentication of secret files in cloud system on behalf of the data owner. The data auditability technique allows the user to make the data integrity check using a third party. Cloud computing offers unlimited data space for storage to its users and also serves sharing of data and planned use of heterogeneous resources in distributed systems. This paper describes privacy-preserving enabled public auditing method using cryptographic techniques for low-performance based end devices.

URLhttps://dl.acm.org/citation.cfm?doid=3231053.3231095
DOI10.1145/3231053.3231095
Citation KeyagarkhedEfficientPrivacyPreserving2018