scholarly journals Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 131534-131542 ◽  
Author(s):  
Qi Li ◽  
Youliang Tian ◽  
Yinghui Zhang ◽  
Limin Shen ◽  
Jingjing Guo
Author(s):  
Sadiq J. Almuairfi ◽  
Mamdouh Alenezi

Cloud computing technology provides cost-saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner's private information because the data owners lose control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. Anonymous Authentication Scheme will be proposed in this chapter as the most relatable, applicable, and appropriate techniques to be adopted by the cloud computing professionals for the eradication of risks that have been associated with the risks and challenges of privacy.


Author(s):  
Sadiq J. Almuairfi ◽  
Mamdouh Alenezi

Cloud computing technology provides cost-saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner's private information because the data owners lose control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. Anonymous Authentication Scheme will be proposed in this chapter as the most relatable, applicable, and appropriate techniques to be adopted by the cloud computing professionals for the eradication of risks that have been associated with the risks and challenges of privacy.


2015 ◽  
Vol 75 (21) ◽  
pp. 13077-13091 ◽  
Author(s):  
Daeyeong Kim ◽  
Hyunsoo Kwon ◽  
Changhee Hahn ◽  
Junbeom Hur

IEEE Network ◽  
2018 ◽  
Vol 32 (3) ◽  
pp. 7-13 ◽  
Author(s):  
Kaiping Xue ◽  
Jianan Hong ◽  
Yongjin Ma ◽  
David S. L. Wei ◽  
Peilin Hong ◽  
...  

2018 ◽  
Vol 7 (3.34) ◽  
pp. 259
Author(s):  
J Jeejo Vetharaj ◽  
S Selvanayaki ◽  
M B.Suseela

Classification, which is commonly used task in data mining applications separates the data present in the database based on some category. For years and years, considering the rise of several privacy issues, solutions in the form of theoretical and practical have been proposed for the classification problem under various security models. However, for the late Notoriety about cloud computing, clients presently have the chance on outsource their data, clinched alongside encrypted form, and also those information mining assignments of the cloud.. The data on the cloud which is in encrypted form, therefore existing privacy preserving classification techniques are not applicable. In this paper, we focus on finding solution for the classification problem over the encrypted data .Users can store their data with encryption by the use of ordered relational data. So, the data is obtained correctly without decrypting. 


Sign in / Sign up

Export Citation Format

Share Document