Skip to main content
Log in

RETRACTED ARTICLE: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

This article was retracted on 07 December 2022

This article has been updated

Abstract

For information investigation, the prevailing intention is on the depository services for influencing the significant part of consumer’s information. Presently the services of the consumer’s precious data are been employed by illegal consumers and service suppliers. The focus is to examine the confidentiality and significance of the consumer’s confidentiality in the prevailing cloud computing world. Steadily the data are preserved within the cloud computing system which gets leveraged because of its flexibility and accessibility. Therefore the immensely responsive data are under severe attacks due to diverse sources. The confidential data are lost and the possibility of confidentiality violation gets escalated which therefore minimizes the belief in cloud suppliers. Within the present information technology world, the data preservation and safeguarding is a crucial task. The data are deposited in the cloud for finance, health care, government firms which make it more intricate in handling the tasks universally. The prevailing conditions henceforth request a fresh confidentiality safeguarding prototypes for preserving the confidentiality of the consumers and offering reliable and violation free services from the cloud. The intention is to plan and improve the cloud supplier’s belief among the consumers. The designed scheme expresses and works together with confidentiality safeguarding scheme for designing, authenticating, supporting, changing and escalating the necessities for safeguarding information. Furthermore, the intention is for securing and authenticating unnamed consumers interference into the private information prevailing within the depository and assuring the behaviors of the cloud services. It also performs as defending protector for immensely private information depositories.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  1. Al-Muhtadia, J., Hillb, R., Al-Rwaisa, S.: Access control using threshold cryptography for ubiquitous computing environments. J. King Saud Univ. Comput. Inf. Sci. 23(2), 71–78 (2011)

    Google Scholar 

  2. Chadwick, D.W., Fatema, K.: A privacy preserving authorization system for the cloud. J. Comput. Syst. Sci. 78, 1359–1373 (2012)

    Article  Google Scholar 

  3. Chandramohan, D., Vengattaraman, T., Basha, M.S.S., Dhavachelvan, P.: MSRCC-Mitigation of security risks in cloud computing. Adv. Comput. Inf. Technol. 176, 525–532 (2012). doi:10.1007/978-3-642-31513-8-54. ISBN: 978-3-642- 31513-8

    Article  Google Scholar 

  4. Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: HPPC-hierarchical Petri-net based privacy nominal model approach for cloud. In: Proceedings of the Annual IEEE India Conference (INDICON), Kochi, vol. 1052, pp. 1047–1052 (2012). doi:10.1109/INDCON.2012.6420771

  5. Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., Dhavachelvan, P.: A privacy preserving representation for web service communicators’ in the cloud. In: Proceedings of the QSHINE-2013, 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, India, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 115, pp. 496–506 (2013). doi:10.1007/978-3-642-37949-9_44

  6. Debnath, A., Singaravelu, P., Verma, S.: Privacy in wireless sensor networks using ring signature. J. King Saud Univ. Comput. Inf. Sci. 26(2), 228–236 (2014)

    Google Scholar 

  7. Dhasarathan, C., Thirumal, V., Ponnurangam, D.: Data privacy breach prevention framework for the cloud service. Secur. Comm. Netw. 8, 982–1005. doi: 10.1002/sec.1054. Dropbox confirms it got hacked, will offer two-factor authentication Spammers used stolen password to access list of Dropbox user emails. Aug-12, News-Conde Nast http://www.Foxnews.com. Facebook Vows to Fix Major Privacy Breach-Australian Report-Sep- 2011, http://www.Foxnews.com. Google to pay $22.5 million to settle privacy charges: July-2012 WSJWall Street Journal, http://www.IBM Live (2015)

  8. Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)

    Article  Google Scholar 

  9. Huang, R., Yu, S., Zhuang, W., Gui, X.: Design of privacy-preserving cloud storage framework. In: Proceedings of the Ninth International Conference on Grid and Cloud Computing, pp. 1–5. Nanjing, Jiangsu (2010)

  10. Huang, R., Gui, X.L., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. Int. Conf. Netw. Comput. Inf. Secur. 1, 93–97 (2011)

    Google Scholar 

  11. Itani, W., Kayssi, A., Chehab, A.: Privacy as a serviceprivacy—aware data storage and processing in cloud computing architectures. In: Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711–716 (2009)

  12. Khan, S.M., Hamlen, K.W.: Anonymous cloud: a data ownership privacy provider framework in cloud computing. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 170–176 (2012)

  13. Li, J., Stephenson, B., Motahari-Nezhad, H.R., Singhal, S.: GEODAC: a data assurance policy specification and enforcement framework for outsourced services. IEEE Trans. Serv. Comput. 4(4), 340–354 (2011)

    Article  Google Scholar 

  14. Lin, H., Shao, J., Zhang, C., Fang, Y.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Foren. Secur. 8(6), 985–997 (2013)

    Article  Google Scholar 

  15. Liu, Q., Wang, G., Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the IEEE International Conference on Computational Science and Engineering, CSE ’09, pp. 715–720 (2009)

  16. Liu, Q., Wang, G., Jie, W.: Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3), 927–933 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Thillaiarasu.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s10586-022-03859-x"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thillaiarasu, N., ChenthurPandian, S. RETRACTED ARTICLE: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. Cluster Comput 22 (Suppl 1), 1179–1188 (2019). https://doi.org/10.1007/s10586-017-1178-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1178-8

Keywords

Navigation