Research Area:  Cloud Security
Cloud computing is becoming a well-known catchphrase in recent times. It is continuously evolving and showing consistent growth in the field of computing. It is applied in several fields along with big data analytics, internet of things and mighty things are done with these recent technologies. But still the security issues and threats that are associated with it are unwieldy. The crucial point of this paper is studying the privacy preserving approaches in cloud computing. This paper analyses and discuss various methods that are involved in conserving the privacy such as writing the access rights, permissions and policies, anonymising data, fragmenting and then reconstructing data. All these approaches would protect the privacy of the authorized information in the case of public auditing on the cloud data. The reviewed approaches are depicted and differentiated with one another and the merits and demerits are stated. Finally the outcomes are grouped together and the issues to be concentrated in the future are drawn out. This would serve as the guidelines in enhancing the privacy conserving approaches in the cloud environment.
Keywords:  
Cloud computing
Data privacy
Encryption
public auditing
Author(s) Name:  K. Karthiban; S. Smys
Journal name:  
Conferrence name:  2018 2nd International Conference on Inventive Systems and Control (ICISC)
Publisher name:  IEEE
DOI:  10.1109/ICISC.2018.8399115
Volume Information:  
Paper Link:   https://ieeexplore.ieee.org/abstract/document/8399115