Privacy Preserving and Data Security Using Anonymous Cloud and RSA
Abstract
Keywords
Full Text:
PDFReferences
. A. Jeeva, Dr.C. Selvan, A. Anitha, “Secure Token Based Storage System toPreserve the Sensitive Data Using ProxyRe-Encryption Technique”, International Journal of Computer Science and Mobile Computing.
. R. Buyya1, Chee Shin Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud Computing and Emerging IT Platforms:Vision, Hype, and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009.
. Y. Lindell, B. Pinkas, ”Secure Multiparty Computation for Privacy-Preserving Data Mining”, Journal of Privacy and Confidentiality, vol. 1, no. 1, pp. 59–98, 2009.
. N. Hopper, E. Y. Vasserman, and E. Chan-Tin, “How much anonymity does network latency leak?” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 2, 2010
. R. Huang, X. Gui, S. Yu, and W. Zhuang, “Research on privacy-preserving cloud storage framework supporting ciphertext retrieval,” in Proceedings of the International Conference on Network Computing and Information Security (NCIS), 2011, pp. 93–97.
. Q. Liu, G. Wang, and J. Wu, “Secure and privacy preserving keyword searching for cloud storage services,” Journal of Network and Compute
. Cynthia C. Dwork, “Differential privacy: A survey of results,” in Proceedings of the 5th International Conference on Theory and Applications of Models of Computation (TAMC), 2008, pp. 1–19.
. P. Samarati, “Protecting respondents’ identities in microdata release,” IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 13, no. 6, pp. 1010–1027, 2001.
. R. Laurikainen, “Secure and anonymous communication in the cloud,” Aalto University School of Science and Technology, Department of Computer Science and Engineering, Tech. Rep. TKK-CSE-B10, 2010.
. D. Chaum, “Security without identification: Transaction systems to make big brother obsolete,” Communications of the ACM (CACM), vol. 28, no. 10, pp. 1030–1044, 1985.
. S. Zarandioon, D. Yao, and V. Ganapathy, “K2C: Cryptographic cloud storage with lazy revocation and anonymous access,” in Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), 2011, pp. 491–510.
. S. M. Khan and K. W. Hamlen, “Computation certification as a service in the cloud,” in Proc. IEEE/ACM Int. Sym. Cluster, Cloud and Grid Computing (CCGrid), 2013, pp. 434–441.
. E. Bertino, F. Paci and R. Ferrini, ” Privacy Preserving Digital Identity Management for Cloud Computing”, IEEE Data Eng. Bull., 2009 - 131.107.65.22 .
. C. wang, Q Wang, K. Ren and W. Lou, “Privacy –Preserving Public Auditing for Data Storage Security in Cloud Computing” INFOCOM, 2010 Proceedings IEEE, dated 14-15 March 2010, pp 1-9.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.