Abstract
For information investigation, the prevailing intention is on the depository services for influencing the significant part of consumer’s information. Presently the services of the consumer’s precious data are been employed by illegal consumers and service suppliers. The focus is to examine the confidentiality and significance of the consumer’s confidentiality in the prevailing cloud computing world. Steadily the data are preserved within the cloud computing system which gets leveraged because of its flexibility and accessibility. Therefore the immensely responsive data are under severe attacks due to diverse sources. The confidential data are lost and the possibility of confidentiality violation gets escalated which therefore minimizes the belief in cloud suppliers. Within the present information technology world, the data preservation and safeguarding is a crucial task. The data are deposited in the cloud for finance, health care, government firms which make it more intricate in handling the tasks universally. The prevailing conditions henceforth request a fresh confidentiality safeguarding prototypes for preserving the confidentiality of the consumers and offering reliable and violation free services from the cloud. The intention is to plan and improve the cloud supplier’s belief among the consumers. The designed scheme expresses and works together with confidentiality safeguarding scheme for designing, authenticating, supporting, changing and escalating the necessities for safeguarding information. Furthermore, the intention is for securing and authenticating unnamed consumers interference into the private information prevailing within the depository and assuring the behaviors of the cloud services. It also performs as defending protector for immensely private information depositories.
Similar content being viewed by others
Change history
07 December 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s10586-022-03859-x
References
Al-Muhtadia, J., Hillb, R., Al-Rwaisa, S.: Access control using threshold cryptography for ubiquitous computing environments. J. King Saud Univ. Comput. Inf. Sci. 23(2), 71–78 (2011)
Chadwick, D.W., Fatema, K.: A privacy preserving authorization system for the cloud. J. Comput. Syst. Sci. 78, 1359–1373 (2012)
Chandramohan, D., Vengattaraman, T., Basha, M.S.S., Dhavachelvan, P.: MSRCC-Mitigation of security risks in cloud computing. Adv. Comput. Inf. Technol. 176, 525–532 (2012). doi:10.1007/978-3-642-31513-8-54. ISBN: 978-3-642- 31513-8
Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: HPPC-hierarchical Petri-net based privacy nominal model approach for cloud. In: Proceedings of the Annual IEEE India Conference (INDICON), Kochi, vol. 1052, pp. 1047–1052 (2012). doi:10.1109/INDCON.2012.6420771
Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., Dhavachelvan, P.: A privacy preserving representation for web service communicators’ in the cloud. In: Proceedings of the QSHINE-2013, 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, India, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 115, pp. 496–506 (2013). doi:10.1007/978-3-642-37949-9_44
Debnath, A., Singaravelu, P., Verma, S.: Privacy in wireless sensor networks using ring signature. J. King Saud Univ. Comput. Inf. Sci. 26(2), 228–236 (2014)
Dhasarathan, C., Thirumal, V., Ponnurangam, D.: Data privacy breach prevention framework for the cloud service. Secur. Comm. Netw. 8, 982–1005. doi: 10.1002/sec.1054. Dropbox confirms it got hacked, will offer two-factor authentication Spammers used stolen password to access list of Dropbox user emails. Aug-12, News-Conde Nast http://www.Foxnews.com. Facebook Vows to Fix Major Privacy Breach-Australian Report-Sep- 2011, http://www.Foxnews.com. Google to pay $22.5 million to settle privacy charges: July-2012 WSJWall Street Journal, http://www.IBM Live (2015)
Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)
Huang, R., Yu, S., Zhuang, W., Gui, X.: Design of privacy-preserving cloud storage framework. In: Proceedings of the Ninth International Conference on Grid and Cloud Computing, pp. 1–5. Nanjing, Jiangsu (2010)
Huang, R., Gui, X.L., Yu, S., Zhuang, W.: Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. Int. Conf. Netw. Comput. Inf. Secur. 1, 93–97 (2011)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a serviceprivacy—aware data storage and processing in cloud computing architectures. In: Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711–716 (2009)
Khan, S.M., Hamlen, K.W.: Anonymous cloud: a data ownership privacy provider framework in cloud computing. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 170–176 (2012)
Li, J., Stephenson, B., Motahari-Nezhad, H.R., Singhal, S.: GEODAC: a data assurance policy specification and enforcement framework for outsourced services. IEEE Trans. Serv. Comput. 4(4), 340–354 (2011)
Lin, H., Shao, J., Zhang, C., Fang, Y.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Foren. Secur. 8(6), 985–997 (2013)
Liu, Q., Wang, G., Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the IEEE International Conference on Computational Science and Engineering, CSE ’09, pp. 715–720 (2009)
Liu, Q., Wang, G., Jie, W.: Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3), 927–933 (2012)
Author information
Authors and Affiliations
Corresponding author
Additional information
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s10586-022-03859-x"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Thillaiarasu, N., ChenthurPandian, S. RETRACTED ARTICLE: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. Cluster Comput 22 (Suppl 1), 1179–1188 (2019). https://doi.org/10.1007/s10586-017-1178-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1178-8