Efficient Security Solution for Privacy Cloud Services

1
V Sai Vaishnav
V Sai Vaishnav
2
A Harshita
A Harshita
3
K.Kondaya
K.Kondaya
1 K L University

Send Message

To: Author

[show_article_issue_title]
Efficient Security Solution for Privacy Cloud Services

Article Fingerprint

ReserarchID

CSTBYMX7J

Efficient Security Solution for Privacy Cloud Services Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

In this paper, we exhibit a novel protection protecting security answer for cloud services. We manage client nameless access to cloud benefits and imparted stockpiling servers. Our answer furnishes enlisted clients with unacknowledged access to cloud services. Our answer offers unacknowledged verification. This implies that clients’ close to home qualities (age, legitimate enrollment, fruitful installment) can be demonstrated without uncovering clients’ character. Accordingly, clients can utilize services without any risk of profiling their conduct. Then again, if clients break supplier’s tenets, their right to gain entrance rights are renounced. We dissect current security safeguarding answers for cloud services and layout our answer in light of cutting edge cryptographic segments. Our answer offers nameless access, unlinkability and the privacy of transmitted information. Also, we execute our answer and we yield the trial comes about and look at the execution with related arrangements.

23 Cites in Articles

References

  1. Yao Chen,Radu Sion (2010). On securing untrusted clouds with cryptography.
  2. C Wang,Q Wang,K Ren,W Lou (2010). Privacypreserving public auditing for data storage security in cloud computing.
  3. Q Wang,C Wang,K Ren,W Lou,J Li (2011). Enabling public auditability and data dynamics for storage security in cloud computing.
  4. Balakrishna Kanakanti*,E Subramanian (2010). Enhancing Data Base Security in Cloud Computing.
  5. M Mowbray,S Pearson (2009). A client-based privacy manager forcloud computing.
  6. Meiko Jensen,Sven Schäge,Jörg Schwenk (2010). Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing.
  7. David Chaum,Eugène Van Heyst (1991). Group Signatures.
  8. Pelin Angin,Bharat Bhargava,Rohit Ranchal,Noopur Singh,Mark Linderman,Lotfi Othmane,Leszek Lilien (2010). An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
  9. Amos Fiat,Adi Shamir (1987). How To Prove Yourself: Practical Solutions to Identification and Signature Problems.
  10. Marina Blanton (2008). Online subscriptions with anonymous access.
  11. J Camenisch,A Lysyanskaya (2004). Signature schemes and anonymous credentials from bilinear maps.
  12. Rongxing Lu,Xiaodong Lin,Xiaohui Liang,Xuemin Shen (2010). Secure provenance.
  13. Sherman Chow,Yi-Jun He,Lucas Hui,Siu Yiu (2012). SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment.
  14. X Boyen,B Waters (2006). Compact group signatures without random oracles.
  15. Lukas Malina,Jan Hajny (2011). Accelerated modular arithmetic for low-performance devices.
  16. Lukas Malina,Martin Zukal (2011). Secure authentication and key establishment in the SIP architecture.
  17. X Boyen,B Waters (2007). Full-domain subgroup hiding and constantsize group signatures.
  18. Jan Hajny,Lukas Malina (2013). Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.
  19. R Cramer (1996). Modular design of secure, yet practical cryptographic protocols.
  20. Jan Camenisch,Ueli Maurer,Markus Stadler (1997). Digital payment systems with passive anonymity-revoking trustees*.
  21. Tatsuaki Okamoto,Shigenori Uchiyama (1998). A new public-key cryptosystem as secure as factoring.
  22. Jan Hajny,Lukas Malina (2012). Practical Revocable Anonymous Credentials.
  23. Z Martinasek,T Macha,O Raso,J Martinasek,P Silhavy (2011). Optimization of differential power analysis.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

V Sai Vaishnav. 2015. \u201cEfficient Security Solution for Privacy Cloud Services\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 14 (GJCST Volume 14 Issue B4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

January 12, 2015

Language

English

Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8525
Total Downloads: 2112
2026 Trends
Related Research

Published Article

In this paper, we exhibit a novel protection protecting security answer for cloud services. We manage client nameless access to cloud benefits and imparted stockpiling servers. Our answer furnishes enlisted clients with unacknowledged access to cloud services. Our answer offers unacknowledged verification. This implies that clients’ close to home qualities (age, legitimate enrollment, fruitful installment) can be demonstrated without uncovering clients’ character. Accordingly, clients can utilize services without any risk of profiling their conduct. Then again, if clients break supplier’s tenets, their right to gain entrance rights are renounced. We dissect current security safeguarding answers for cloud services and layout our answer in light of cutting edge cryptographic segments. Our answer offers nameless access, unlinkability and the privacy of transmitted information. Also, we execute our answer and we yield the trial comes about and look at the execution with related arrangements.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Efficient Security Solution for Privacy Cloud Services

V Sai Vaishnav
V Sai Vaishnav K L University
A Harshita
A Harshita
K.Kondaya
K.Kondaya

Research Journals