Article,

Securing Privacy of Data in E-Marketing Against Malicious User

, and .
International Journal of Innovative Science and Modern Engineering (IJISME), 3 (8): 1-5 (July 2015)

Abstract

Internet is at its best for personal as well as professional use as long as it is involved in anonymous communication. There are many technologies which are evolving and growing consistently in the field of computer one of them is cloud computing. But, the security issues and threats associated with it still serve as hindrances. The focal point of this paper is privacy preserving of data in cloud. There are different approaches for preserving privacy of data. Our main concentration would be securing privacy of data in cloud by assigning ID’s (further referred as token) which are unique. The goal of unique ID’s is to eliminate the privacy risk by modifying the dataset in such a way that only owner can access the original data. Preferably, any authority, server or an adversary alone should not know any client’s personal information. This paper analyses and discusses various approaches for securing data like adopting cryptographic methods, writing access rights and policies, anonymising data, assigning unique ID’s or token .Finally, the approach is made as why anonymity technique is used. Algorithms are discussed for anonymous sharing of private data among N parties. A technique is used so that ID numbers are used ranging from 1 to N.This assignment is anonymous such that when the identities are received at other end these are unknown to the other members of the group.

Tags

Users

  • @ijisme_beiesp

Comments and Reviewsshow / hide

  • @ijisme_beiesp
    3 years ago (last updated 3 years ago)
    good
Please log in to take part in the discussion (add own reviews or comments).