Special Issue Article
Enabling Cost-Effective Privacy Preserving Of Intermediate Sensitive Data Sets in Cloud Using Proxy Re-Encryption Technique
M.E. Student, Department of CSE, Sri Eshwar College of Engineering, Anna University - Chennai, India
|Related article at Pubmed, Scholar Google|
Propose an upper bound privacy leakage constraint based approach to find which dataset is need to encrypted. Because encrypting all datasets is very time consuming. Encrypted dataset is outsourced in different cloud providers. The datasets are divided into several parts and stored in different cloud storage. So the privacy preserving cost can be saved. To preserve privacy, the user will encrypt their data and re-encrypted form of data greatly impedes the utilization due to its randomness. So the data stored in cloud only on encrypted form. The data can be accessible only to users with the correct keys. The proxy re-encryption techniques can prevent against the errors and attacks.