ACCESS CONTROL BY SIGNATURE-KEYS TO PROVIDE PRIVACY FOR CLOUD
Keywords:
informationAbstract
One of the most important concerns with cloud computing and large data is the privacy
of data subjects. Cloud computing and big data privacy breaches occurred as a result of
many threats to data from both within and outside the organisation, according to the
privacy approaches examined in earlier studies. The fact that the owner does not have
control over the information pertaining to the stored transactions poses a significant
danger to their privacy. In this scenario, customers entrust critical information, such as
company plans or private details, to the cloud servers run by cloud providers, who they
do not fully trust. One easy way to keep sensitive information private is to apply certain
privacy measures to transaction data before storing it in the cloud. All three models—
the cloud's architecture, the transaction manager, and the clients—are included in this
paper's proposed case study. All transactions involve third parties, and data flows are
realised via several layers of protection, as our case study is founded on the concept of
zero trust among the three models.
Downloads
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.