A privacy breach preventing and mitigation methodology for cloud service data storage

The present paper focuses on privacy preserving technique. Cloud computing is not a new technology more over it is a new way of delivering technology. Providers deliver it in the form of services, in computing field security is the main concern which blocks the tremendous growth of Cloud computing and became a huge debate area worldwide, due to security breach of user's valuable information. So we identified the week service bonding of cloud providers in maintaining, and preserving users' secrecy and failed to have a universal service level agreement. This paper focus on privacy mitigation methodology by proposing a privacy preserving algorithmic approach to congregate the privacy issue and preserve ones confidential data stored in the cloud.

[1]  P. Dhavachelvan,et al.  Web Service Suitability Assessment for Cloud Computing , 2011 .

[2]  Ramachandran Baskaran,et al.  A Privacy Preserving Representation for Web Service Communicators' in the Cloud , 2013, QSHINE.

[3]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[4]  P. Dhavachelvan,et al.  HPPC-Hierarchical Petri-Net based Privacy nominal model approach for Cloud , 2012, 2012 Annual IEEE India Conference (INDICON).

[5]  Jinjun Chen,et al.  A historical probability based noise generation strategy for privacy protection in cloud computing , 2012, J. Comput. Syst. Sci..

[6]  Ramachandran Baskaran,et al.  QoS enhancements for global replication management in peer to peer networks , 2012, Future Gener. Comput. Syst..

[7]  P. Dhavachelvan,et al.  Complexity measures for software systems : towards multi-agent based software testing , 2005, Proceedings of 2005 International Conference on Intelligent Sensing and Information Processing, 2005..

[8]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[9]  G. V. Uma,et al.  A new approach in development of distributed framework for automated software testing using agents , 2006, Knowl. Based Syst..

[10]  Ayman I. Kayssi,et al.  Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[11]  G. V. Uma,et al.  Reliability Enhancement in Software Testing - An Agent-Based Approach for Complex Systems , 2004, CIT.

[12]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[13]  Yan Zhao,et al.  Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.

[14]  Dhavachelvan Ponnurangam,et al.  A survey of keyword spotting techniques for printed document images , 2010, Artificial Intelligence Review.

[15]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[16]  S. K. V. Jayakumar,et al.  Dwse-simulator for distributed web service environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[17]  P. Victer Paul,et al.  Improving Efficiency of Peer Network Applications by Formulating Distributed Spanning Tree , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.

[18]  M. Shanmugam,et al.  SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues , 2012, ACITY.

[19]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.

[20]  Jinjun Chen,et al.  An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing , 2012, ICSOC.

[21]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[22]  Jie Wu,et al.  Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..

[23]  P. Dhavachelvan,et al.  An agent-based personalized E-learning environment: Effort prediction perspective , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[24]  C. Chellappan,et al.  Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.

[25]  Ramachandran Baskaran,et al.  An application perspective evaluation of multi-agent system in versatile environments , 2011, Expert Syst. Appl..

[26]  T. Vengattaraman,et al.  MSRCC - Mitigation of Security Risks in Cloud Computing , 2012, ACITY.

[27]  M. S. Saleem Basha,et al.  Web Service Based Secure E-Learning Management System- EWeMS , 2010, J. Convergence Inf. Technol..

[28]  David W. Chadwick,et al.  A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..