2012
DOI: 10.1016/j.protcy.2012.05.079
|View full text |Cite
|
Sign up to set email alerts
|

Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Subsequently, A challenge response protocol is also used to verify the storage correctness as well as identifying misbehaving servers [4][8] [16] to block the server which is not authenticated . Finally, the procedure for file retrieval & error recovery based on erasure-correcting code is outlined [7][8] [17].…”
Section: Ensuring Security In Cloud Data Storagementioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, A challenge response protocol is also used to verify the storage correctness as well as identifying misbehaving servers [4][8] [16] to block the server which is not authenticated . Finally, the procedure for file retrieval & error recovery based on erasure-correcting code is outlined [7][8] [17].…”
Section: Ensuring Security In Cloud Data Storagementioning
confidence: 99%
“…For this various security protocols are used [5] [6]. In this paper we have used encryption technique that can ensure us the quality and security of data like [7].If any user want to retrieve that data than CSP is communicated .various operations can be performed on this like insertion and deletion and updating of data. This is not easy to manage this kind of services where multi-tenancy is uses.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, through analyzing user behaviors, the CSP can potentially compromise user privacy. In [10], the authors proposed a method for anonymity using group digital signature technology. Because this method introduced no correlation between user signatures, this method is an improvement over the aforementioned methods.…”
Section: Related Workmentioning
confidence: 99%
“…This for � of enc � ypted data in cloud is good for storage or arc�lVal but IS rather costly to process. The Cloud Security Alhanc � � ecommend � cloud provider to provide stronger authentIcatIOn mechamsm and also (optionally) allow users to use third party identity management and single sign-on platforms like Microsoft Passport [2]. This may lead to an added set of authentication complexity.…”
Section: Related Workmentioning
confidence: 99%
“…Identity Anonymization and Secure Data Storage using Group signature is a new approach for securing the user data [2] . They discuss how RSA algorithm can be used to secure data in private cloud.…”
Section: Related Workmentioning
confidence: 99%