{"id":5222,"date":"2023-08-25T18:32:41","date_gmt":"2023-08-25T18:32:41","guid":{"rendered":"https:\/\/getmyprojects.in\/projects\/?post_type=product&#038;p=5222"},"modified":"2023-10-26T11:47:51","modified_gmt":"2023-10-26T06:17:51","slug":"privacy-protection-and-data-security-in-cloud","status":"publish","type":"product","link":"https:\/\/getmyprojects.in\/projects\/product\/privacy-protection-and-data-security-in-cloud\/","title":{"rendered":"Privacy Protection and Data Security in Cloud"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Privacy and security are the most important issues to the popularity of cloud computing service.<\/span><br \/>\n<span style=\"color: #000000;\">In recent years, there are many research schemes of cloud computing privacy protection based on access<\/span><br \/>\n<span style=\"color: #000000;\">control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified logic.<\/span><br \/>\n<span style=\"color: #000000;\">In this project\u00a0 we systematically review and analyze relevant research achievements.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy\u00a0 protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based encryption),<\/span><br \/>\n<span style=\"color: #000000;\">CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable<\/span><br \/>\n<span style=\"color: #000000;\">encryption(SE), trust, reputation, extension of tradition access control and hierarchical key; third, we propose<\/span><br \/>\n<span style=\"color: #000000;\">the research challenge and future direction of the privacy protection in the cloud computing; finally, we point<\/span><br \/>\n<span style=\"color: #000000;\">out corresponding privacy protection laws to make up for the technical deficiencies.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">We proposed relevant research achievements. First, we discuss the architecture, concepts and several shortcomings of cloud computing, and propose a framework of privacy protection; second, we discuss and analyze basic ABE, KP-ABE (key policy attribute-based encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable encryption(SE), trust, reputation, extension of tradition access control and hierarchical key; third, we propose the research challenge and future direction of the privacy protection in the cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<table>\n<tbody>\n<tr>\n<th><strong>Project Name<\/strong><\/th>\n<td>Privacy Protection and Data Security in Cloud<\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Front End\u00a0<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr>\n<th><strong>Back End<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Software<\/strong><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":5297,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"product_cat":[29,28],"product_tag":[46,33,47,48,49],"_links":{"self":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5222"}],"collection":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/comments?post=5222"}],"version-history":[{"count":1,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5222\/revisions"}],"predecessor-version":[{"id":6406,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5222\/revisions\/6406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media\/5297"}],"wp:attachment":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media?parent=5222"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_cat?post=5222"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_tag?post=5222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}