Recently the cloud computing paradigm has been receiving significant excitement and attention in the media and blogosphere. To some, cloud computing seems to be little more than a marketing umbrella, encompassing topics such as distributed computing, grid computing, utility computing, and software-as-a-service, that have already received significant research focus and commercial implementation. In this paper, […]
ANONYMIZE LARGE SCALE DATASETS USING MAPREDUCE ON CLOUD BASED ON TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH
Data anonymization has been extensively studied and widely adopted for data privacy preservation in non inter active data publishing and sharing scenarios. Data anonymization refers to hiding identity and/or sensitive data for owners of data records. Then, the privacy of an individual can be effectively preserved while certain aggregate information is exposed to data users […]
Ongoing Authorization Model for Cloud Computing
This paper proposed an Authorization Model for Cloud Computing. The proposed model aims to extend the UCONABC ongoing authorization model, providing resilience to the reevaluation of usage policies. Resilience means providing the model with the ability to deal with some individual user authorization attributes exceeding, while the SLA for the respective consumption service is under […]
KAC: Key Aggregate cryptosystem – A New Data Sharing Model
This paper proposes a new public key encryption called key aggregate cryptosystem (KAC). In KAC, the data owner establishes the public system parameter via Setup and generates a public/master-secret key pair via KeyGen. Messages can be encrypted via Encrypt by anyone who also decides what ciphertext class is associated with the plaintext message to be […]
ToF: Transformation based Optimizations in Cloud
we propose ToF, a transformation-based workflow optimization system to address the performance and monetary cost optimizations in the cloud. We develop and deploy the workflow optimization system in real cloud environments, and demonstrate its effectiveness and efficiency with extensive experiments. ToF has two major components for performance and cost optimizations: transformation model and planner. The […]
Cloud-Assisted Privacy-Preserving E-Health System
This paper proposed a cloud-assisted mobile-access of health data with privacy and audit-ability. The system consists of two components: searchable encryption and auditable access control. Upon receiving the health data from users, the private cloud processes and stores it on public cloud such that storage privacy and efficient retrieval can be guaranteed. The private cloud […]
Privacy Preserving Authenticated Access Control Scheme
This paper proposes privacy preserving authenticated access control scheme. In this scheme to scheme a user can create a file and store it securely in the cloud. This scheme consists of use of the two protocols Attribute Base Encryption (ABE) and Attribute Based Signature (ABS). Distributed access control of data stored in cloud so that […]
Cloud computing data storage system model
Cloud computing has received considerable attention from both academia and industry due to a number of important advantages including: cost effectiveness, low management overhead, immediate access to a wide range of applications, flexibility to scale up and down information technology (IT) capacity, and mobility where customers can access information wherever they are, rather than having […]
Privacy-Preserving Public Auditing Scheme
To achieve privacy-preserving public auditing, we propose to uniquely integrate the homomorphic linear authenticator with random masking technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated the server. With random masking, the TPA no longer has all the necessary information to build up a correct […]
A secure cloud storage system Supporting privacy-preserving public auditing
Cloud Computing has been envisioned as the next-generation information technology (IT) architecture for enterprises, due to its long list of unprecedented advantages in the IT history: on-demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk . As a disruptive technology with profound implications, Cloud Computing is […]