Real time personalized target analysis With multi level access restriction to Improve privacy preservation in cloud Environment
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Cloud computing becomes a successful standard for data processing and storage. Collective worries about data security and privacy in the cloud, though, have emerged. Security is challenging and dangerous when data are shared in the cloud because an authorized person can steal the data. Cloud computing is system based expertise since security issues like privacy, data security, confidentiality etc. are met. It has a number of users, who are using cloud services like social network, email, file-sharing and other which are increasing the data load in cloud storage regularly. It is also increasing the risk of data vulnerability. Therefore, the data security must be provided in cloud computing models.
newlineData security for centralized storage is all in the cloud, so you need to raise your privacy standards. The security industry, such as cloud network security, data centre security, and distributed security, is already very good at providing data security in the cloud. Shortly, many technologies will be introduced to protect the privacy of cloud users. Early methods protect user privacy by restricting malicious access from various users. Data authentication is demonstrable access to maintaining standards such as privacy. However, cloud user privacy has been compromised many times. A multi-level micro-access restriction algorithm is first proposed to improve cloud security and implement effective privacy protection. Cloud data is indexed at multiple stages. During data transmission, encryption is applied at different levels to make a transmission. User requests are evaluated for trusted access according to the privileges in the configuration file data. Similarly, cloud data is encrypted with a user key owned by the data owner. This method estimates the micro access trust weight that is used to limit malicious access to users and protect their privacy. This method improves the security performance of cloud and increases the accuracy of privacy protection
newline