An analysis of privacy preservation schemes in cloud computing

M. Thangavel, P. Varalakshmi, S. Sridhar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

The amount of data usage is high appreciated day by day with the next generation technologies. Technologies encourage the users to perform day to day and research activities in the field of data management, which also improves the automation of such human, machine interaction across the world. To handle the increased data population, in today's scenario the only technology house suggested is cloud data storage. The cloud computing model helps to manage and maintain the data with various services and deployment models. Outsourcing the data in the cloud gives a big relief for data storage in local machines. But, the security of the outsourced data is still an challenging issue. Privacy loss of the user's data affects the reliable service delivery in cloud. Most researchers have proposed some encryption techniques which helps to ensure privacy for a particular level in cloud. Based on the survey done by various researchers, No complete privacy preservation system is available in today's world. In this paper, comparative study on privacy preservation schemes in cloud provides a clear view on the privacy issues and methods to preserve in the cloud data storage.

Original languageEnglish
Title of host publicationProceedings of 2nd IEEE International Conference on Engineering and Technology, ICETECH 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages146-151
Number of pages6
ISBN (Electronic)9781467399166
DOIs
Publication statusPublished - Sept 15 2016
Externally publishedYes
Event2nd IEEE International Conference on Engineering and Technology, ICETECH 2016 - Coimbatore, India
Duration: Mar 17 2016Mar 18 2016

Publication series

NameProceedings of 2nd IEEE International Conference on Engineering and Technology, ICETECH 2016

Conference

Conference2nd IEEE International Conference on Engineering and Technology, ICETECH 2016
Country/TerritoryIndia
CityCoimbatore
Period3/17/163/18/16

Keywords

  • Access control
  • Cloud
  • Data Security
  • Data storage
  • Privacy

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An analysis of privacy preservation schemes in cloud computing'. Together they form a unique fingerprint.

Cite this