A New Scheme for Privacy Preservation with Optimization for Data in Cloud Computing
Ritu Prajapati, Nirav Shah
Privacy-Preservation, Edge computing, Data anonymization
To fulfill people’s requirements for low latency and strong computing power in mobile devices, edge computing emerges as a paradigm for realizing service provisioning in the edge of mobile cloud near the activity area of the mobile subscribers. Among the numerous researches on location privacy preservation, cloud-based location privacy preservation has become a hot topic, but it undoubtedly brings new problems such as data confidentiality and user privacy disclosure. Design for wearable devices with identity authentication and data access control considerations in the space-aware and time-aware contexts. In the time-aware cloud computing mode, ciphertext policy attribute based encryption is applied for fine-grained access control, and bloom filter is used to achieve efficient data structure without privacy exposure. In these paper works on privacy preservation with trust mechanism.
Article Details
Unique Paper ID: 151592

Publication Volume & Issue: Volume 8, Issue 1

Page(s): 356 - 359
Article Preview & Download

Share This Article

Conference Alert


AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management


Last Date: 7th November 2021

Go To Issue

Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Email: editor@ijirt.org
Website: ijirt.org