Open Access   Article Go Back

Privacy Protection on Cloud Computing with Auditing Scheme

Nimmymol Manuel1 , Simy Mary Kurian2 , Neena Joseph3 , Neema George4

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 329-333, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.329333

Online published on Dec 31, 2017

Copyright © Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George, “Privacy Protection on Cloud Computing with Auditing Scheme,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.329-333, 2017.

MLA Style Citation: Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George "Privacy Protection on Cloud Computing with Auditing Scheme." International Journal of Computer Sciences and Engineering 5.12 (2017): 329-333.

APA Style Citation: Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George, (2017). Privacy Protection on Cloud Computing with Auditing Scheme. International Journal of Computer Sciences and Engineering, 5(12), 329-333.

BibTex Style Citation:
@article{Manuel_2017,
author = {Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George},
title = {Privacy Protection on Cloud Computing with Auditing Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {329-333},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5497},
doi = {https://doi.org/10.26438/ijcse/v5i12.329333}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.329333}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5497
TI - Privacy Protection on Cloud Computing with Auditing Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Nimmymol Manuel, Simy Mary Kurian, Neena Joseph, Neema George
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 329-333
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
97 179 downloads 84 downloads
  
  
           

Abstract

Distributed computing gives an assortment of administrations to our current specialized regions. It is helpful for the two customers and organizations to utilize applications without access their own records. Security is an unavoidable component of our cloud administration. So we ought to make sure that our specialist organization can give the security to our information. Yet, various prominent hacking cases will prompt various sorts of safety issues on cloud. It for the most part happens in multi clients distributed computing regions Cloud security is significant in each field of clients. Everybody needs to give their data completely safe. For this reason, here we can utilize property-based encryption that is a kind of open key encryption. Characteristic based encryption permits information proprietors and clients to encode and decode in light of the individual ascribes. So we propose a audit scheme which gives a sort of security insurance on clients and keep from unapproved access from programmers.

Key-Words / Index Term

Encryption, CP-ABE, Collusion Attack

References

[1] K. Yang and X. Jia, “Expressive, efficient and revocable data access control for multi-authority cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol.25, Issue.no.7,pp. 1733-1744 2013.
[2] K. Xue and P. Hong, “A dynamic secure group sharing framework in public cloud computing,” IEEE Transactions on Cloud Computing, Vol. 2, Issue 4, pp. 459–470, 2014.
[3] ]. J. Han, W. Susilo, Y. Mu, J. Zhou, and M. H. A. Au, “Improving privacy and security in decentralized cipher text policy attribute-based encryption,” IEEE Transactions on Information Forensics and Security, Vol. 10, Issue. 3, pp. 665–678, 2015
[4] K. Yang, X. Jia, and K. Ren, “Secure and verifiable policy update outsourcing for big data access control in the cloud,” IEEE Transactions on Parallel &Distributed Systems, Vol. 26, Issue 12, pp. 3461–3470, 2015.
[5] W. Li, K. Xue, Y. Xue, and J. Hong, “TMACS:A robust and verifiable threshold multi-authority access control system in public cloud storage,” IEEE Transactions on Parallel & Distributed Systems, Vol. 27, Issue. 5, pp. 1484– 1496, 2016
[6] Kai Fan1*, Qiong Tian1, Junxiong Wang1, Hui Li1, Yintang Yang2, “Privacy Protection Based Access Control Scheme in Cloud-Based Services” Vol.14,Issue.1,pp.61-71