Indian Journal of Science and Technology
DOI: 10.17485/ijst/2013/v6i5.18
Year: 2013, Volume: 6, Issue: 5, Pages: 1-5
Original Article
T. Jothi Neela1 * and N. Saravanan2
1 PG Student, School of Computing, [email protected]
2 Assistant Prof., School of Computing, [email protected]
*Author For Correspondence
T. Jothi Neela
PG Student, School of Computing,
Email:[email protected]
Cloud Computing is continuously evolving and showing consistent growth in the field of computing. But, the security issues and threats associated with it still stay as a cumbersome. The focal point of this paper is Privacy preserving in cloud computing. This paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, anonymising data, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud data. The surveyed approaches are showcased and compared with one another, stating their pros and cons. Finally, the results are centralized and the issues to be concentrated in the future are drawn out. Enabling complete user control over his data, anonymising or encrypting the sensitive data before outsourcing, notifying the data owner upon data access, altogether with the tied up security mechanisms would nullify the privacy issue. This would serve as a helping note in the progress of strengthening the privacy preserving approaches in Cloud Computing.
Keywords: Cloud Computing, Privacy Preserving, Access Control, Public Auditing
Subscribe now for latest articles and news.