Filters








14,568 Hits in 7.9 sec

Scalable Privacy Preservation in Big Data a Survey

S. Vennila, J. Priyadarshini
2015 Procedia Computer Science  
Increase in data volume leads to flexible and scalable privacy preservation of such dataset over the MapReduce framework is BigData applications.  ...  Existing approaches employ local recording anonymization for privacy preserving where data are processed for analysis, mining and sharing.  ...  Wanchun Dou et. al.,[2] have enhanced History record-based Service optimization method, named HireSome-II ,a cross-cloud service composition for processing big data applications.  ... 
doi:10.1016/j.procs.2015.04.033 fatcat:ptyt3zbxyjdqjpmc3vcnpqvqxe

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

Gladiss Merlin. N
2017 International Journal of Scientific Research and Management  
The privacy is preserved by the chunk of data stored in a various server's. Then further improvisation is taken to introduce low overhead on computation and communication in future.  ...  An effective method proposed for this challenging problem is privacy-preserving search over encrypted cloud data.  ...  Privacy Preserving And Efficient Search On Cloud Computing Privacy-preserving query over encrypted graphstructured data in cloud computing establish a strict privacy requirements for a secure cloud data  ... 
doi:10.18535/ijsrm/v5i12.06 fatcat:zqne5kvarzdw7pgeizjwbztmpm

Towards a New Paradigm for Privacy and Security in Cloud Services [article]

Thomas Loruenser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Huebner, Thomas Gross, Thomas Langer, Mathieu des Noes, Henrich C. Poehls, Boris Rozenberg, Daniel Slamanig
2015 arXiv   pre-print
We present a new approach towards a next generation of security and privacy enabled services to be deployed in only partially trusted cloud infrastructures.  ...  the required security with the strongest notion possible, namely by means of cryptography.  ...  It combines efficient Byzantine protocols with various types of secret sharing protocols to cope with different adversary settings in a flexible way.  ... 
arXiv:1506.05980v2 fatcat:bv6ziphc7jfshhwkfqlrp57iim

A Credential Data Privacy Preserving in web Environment using Secure Data Contribution Retrieval Algorithm

Kumaran U, Neelu Khare
2019 Journal of Intelligent Computing  
The main objective of the article is to contribute and retrieve the data with minimal classification error and execution time with enhanced privacy.  ...  However, a system is unable to maintain the privacy during online services.  ...  In spite of the large body of research devoted to service composition, service composition remains a challenging task in particular regarding privacy.  ... 
doi:10.6025/jic/2019/10/3/102-110 fatcat:ptjzx4whyvehlcwj3ff6tosb74

Security, Privacy, and Trust for Cyber-Physical-Social Systems

Laurence T. Yang, Wei Wang, Gregorio Martinez Perez, Willy Susilo
2019 Security and Communication Networks  
Ma et al. consider privacy issues related to the social world and construct a personalized and continuous location privacy-preserving framework called GLPP in account linked platforms with different LBSs  ...  Zhu et al. propose an approximate Fast privacy-preserving equality Test Protocol (FTP), which can securely complete string equality test and achieve high running efficiency at the cost of little accuracy  ... 
doi:10.1155/2019/2964673 fatcat:7o7naassvbexvdosjxoiezsj3y

A Credential Data Privacy Preserving in Web Environment Using Secure Data Contribution Retrieval Algorithm

Kumaran Umapathy, Neelu Khare
2017 International Journal of Intelligent Engineering and Systems  
The main objective of the article is to contribute and retrieve the data with minimal classification error and execution time with enhanced privacy.  ...  It also considers the efficient data extraction with a good ranking of attributes in tables.  ...  RDT algorithm is used an adjustable weighting mechanism to adjust the degree of data perturbation for maximizing the flexibility of privacy-preserving.  ... 
doi:10.22266/ijies2017.0630.41 fatcat:j4sg7pf4z5bq3ieaijzfi7do4e

A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES

R. Ahila
2017 International Journal of Advanced Research in Computer Science  
Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities  ...  Cloud computing is an emerging technology with promising future is becoming more and more popular nowadays. It allows users with unlimited resource.  ...  In flexible distributed storage integrity auditing mechanism [6] provided a secure and dependable services in cloud computing.  ... 
doi:10.26483/ijarcs.v8i7.4377 fatcat:yl7umbggmbeshbex4tbviak23a

Differential Privacy Technique for Privacy Preservation on Big Data

Johnny Antony P
2019 International Journal for Research in Applied Science and Engineering Technology  
To overcome the drawbacks of existing privacy preservation methods such as both cryptographic techniques and data anonymization are analyzed with differential privacy method in this article.Privacy has  ...  This privacy based data mining is important for sectors like Healthcare, Pharmaceuticals, Research, and Security Service Providers etc.  ...  Cross-cloud service composition provides a stable approach capable for large-scale big data processing.  ... 
doi:10.22214/ijraset.2019.6049 fatcat:nocjjhvhffgs3gs2h3lzxmts2y

Advances in applying soft computing techniques for big data and cloud computing

B. B. Gupta, Dharma P. Agrawal, Shingo Yamaguchi, Michael Sheng
2018 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
This special issue presents some selected papers dealing with different aspects of big data and cloud computing research issues and other related areas and also emphasizes many open questions (Hossain  ...  Compliance with ethical standards Conflict of interest The authors declare that they have no conflict of interest.  ...  The first article entitled, "An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage" authored by Debiao He et al., presents an efficient and secure searchable  ... 
doi:10.1007/s00500-018-3575-1 fatcat:lni3r2tqsvdxbp2v6sb33xqa5q

2019 Index IEEE Transactions on Services Computing Vol. 12

2020 IEEE Transactions on Services Computing  
-Oct. 2019 786-799 Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition.  ...  -Oct. 2019 824-835 Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing. Ma, L., +, TSC Sept.  ... 
doi:10.1109/tsc.2020.2965435 fatcat:tim4rhxag5dqpbhvtgpwvp6ibm

A service-oriented architecture for robust e-voting

Richard Cooke, Rachid Anane
2012 Service Oriented Computing and Applications  
This paper is concerned with addressing this issue. It is argued that a two-level consideration of robustness can facilitate the design of e-voting systems and enhance their resilience.  ...  In addition to the just-in-time composition of the e-voting system, it supports the distribution of tasks and state. The system conforms to most e-voting requirements.  ...  Enhancement with BPEL The Web Services composition process is ad hoc. A more disciplined approach can be supported by enabling WS-BPEL to preside over the management of Web services.  ... 
doi:10.1007/s11761-012-0108-0 fatcat:u5k6kjrsg5ertnw7wku4776xem

Editorial: Security and Privacy in Computing and Communications

Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu
2020 Journal on spesial topics in mobile networks and applications  
application, IoT service and application, big data application, etc.  ...  With the advances in information systems and technologies, we are witnessing the advent of novel challenges on security and privacy in computing and communications for mobile devices, cloud and Internet  ...  The second article titled "Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet" provided a secure and efficient service retrieval scheme in cloud computing.  ... 
doi:10.1007/s11036-020-01683-4 fatcat:lf6rubtslbex5f2g2cku4ydy7i

Enhance Data Privacy in Service Compositions through a Privacy Proxy

Zhendong Ma, Jurgen Manglery, Christian Wagner, Thomas Bleier
2011 2011 Sixth International Conference on Availability, Reliability and Security  
We furthermore show that by utilizing the privacy proxy in combination with advertising its capabilities and requirements as service level agreements (SLA's), it is possible to enhance data privacy in  ...  To do so, we propose a practical, scalable and light-weight privacy-enhanced design that uses a privacy proxy to achieve data privacy.  ...  In this paper, we proposed a privacy proxy service (PPS)-based architecture to enhance user data privacy in service compositions with nested Web services.  ... 
doi:10.1109/ares.2011.94 dblp:conf/IEEEares/MaMWB11 fatcat:kd5txea5bbgp5fsizpgyr72cjy

An Analysis of Privacy Preserving Data Storage and Retrieval Approaches in Heterogeneous Multi-cloud Architectures

Suganya M, Dr. Sasipraba T.
2021 Indian Journal of Computer Science and Engineering  
In order to resolve these issues, several privacy preserving data storage and retrieval models are presented in the literature to store data securely and reduce the computational resources.  ...  Cloud storage and retrieval are considered essential services of cloud computing (CC), which enables the data owner to store the data from the local computing systems to the cloud.  ...  Lahmar and Mezni [10] developed a security aware multi cloud service composition method by RS and fuzzy formal concept analyses (fuzzy FCA), that are 2 methods with a robust mathematic background.  ... 
doi:10.21817/indjcse/2021/v12i4/211204074 fatcat:5fi3lysbnjhrlokv4l4l3bbdge

Study of Dynamic Multikeyword Text Search Techniques over Encrypted Data in Cloud

Ankita Puri, Naveen Kumari
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In this paper, for the first time, we define and solve the challenging problem of privacy preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy  ...  Suppose, a large number of users that are on cloud and large number of documents on cloud, Its important for the service provider to allow multi-keyword query and provided the result that meet efficient  ...  Finally a flexible search over the database is performed to derive the final outcome. The result analysis is based on the basis of effectiveness and efficiency of the cloud services [2] .  ... 
doi:10.23956/ijarcsse.v7i8.82 fatcat:xaazbd5skffrhkehobinfzyjiu
« Previous Showing results 1 — 15 out of 14,568 results