A New Scheme for Privacy Preservation with Optimization for Data in Cloud Computing

  • Unique Paper ID: 151592
  • Volume: 8
  • Issue: 1
  • PageNo: 356-359
  • Abstract:
  • To fulfill people’s requirements for low latency and strong computing power in mobile devices, edge computing emerges as a paradigm for realizing service provisioning in the edge of mobile cloud near the activity area of the mobile subscribers. Among the numerous researches on location privacy preservation, cloud-based location privacy preservation has become a hot topic, but it undoubtedly brings new problems such as data confidentiality and user privacy disclosure. Design for wearable devices with identity authentication and data access control considerations in the space-aware and time-aware contexts. In the time-aware cloud computing mode, ciphertext policy attribute based encryption is applied for fine-grained access control, and bloom filter is used to achieve efficient data structure without privacy exposure. In these paper works on privacy preservation with trust mechanism.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{151592,
        author = {Ritu Prajapati and Nirav Shah},
        title = {A New Scheme for Privacy Preservation with Optimization for Data in Cloud Computing},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {8},
        number = {1},
        pages = {356-359},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=151592},
        abstract = {To fulfill people’s requirements for low latency and strong computing power in mobile devices, edge computing emerges as a paradigm for realizing service provisioning in
the edge of mobile cloud near the activity area of the mobile subscribers. Among the numerous researches on location privacy preservation, cloud-based location privacy
preservation has become a hot topic, but it undoubtedly brings new problems such as data confidentiality and user privacy disclosure. Design for wearable devices with identity authentication and data access control considerations in the space-aware and time-aware contexts. In the time-aware cloud computing mode, ciphertext policy attribute based encryption is applied for fine-grained access control, and bloom filter is used to achieve efficient data structure without privacy exposure. In these paper works on privacy preservation with trust mechanism.
},
        keywords = {Privacy-Preservation, Edge computing, Data anonymization},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 8
  • Issue: 1
  • PageNo: 356-359

A New Scheme for Privacy Preservation with Optimization for Data in Cloud Computing

Related Articles