scholarly journals A Novel Privacy Preserving Public Appraising Mechanism for Shared Data Distribution in the Cloud

2015 ◽  
Vol 116 (6) ◽  
pp. 30-33
Author(s):  
Kirti Panmand ◽  
Sandeep Kadam
2015 ◽  
Vol 2 (2) ◽  
pp. 22-30
Author(s):  
Lokanadham Naidu Vadlamudi ◽  
◽  
Srinivasulu Asadi ◽  

2018 ◽  
Vol 7 (3.34) ◽  
pp. 331 ◽  
Author(s):  
Vigneswari D ◽  
Kumar Kumar N ◽  
Dr R.Lakshmi Tulasi

Cloud is an impetus technology revolution, allowing data providers to store their privatized Electronic Health Record (EHR) for further analysis and outlook with a compromised privacy, where the shared data being exposed to various adversary attacks and malware threats. There are several masking and randomization techniques that provide hints of privacy. In this paper, the Electronic Health Record (EHR) values are perturbed using logarithmic data perturbation and outsourced to the cloud.Aims.To develop a privacy-preserving technique for effective sharing ofElectronic Health Record (EHR) on a cloud by logarithmic data perturbation.Methods.Synthetic logarithmic transformation is applied to the sensitive values in a record before they are outsourced and for better privacy.Results. Synthetic Logarithmic Transformation along with the incremental anonymization produces effective result compared to classical anonymization.. 


Author(s):  
M. Shaheda Begum

Abstract: Motivated by the exponential growth and the huge success of cloud data services bring the cloud common place for data to be not only stored in the cloud, but also shared across multiple users. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity. Keywords: Public auditing, privacy-preserving, shared data, cloud computing


Sign in / Sign up

Export Citation Format

Share Document