Comparison of Privacy-Preserving Models Based on a Third-Party Auditor in Cloud Computing


Cloud computing is emerging as a significant utility service with a focus on outsourcing the data for individual consumers as well as for organizations. It has drastically transformed the way consumers store and organize their private and confidential data. Despite significant advancements in the cloud computing technology, concerns about security and other cloud adoption issues, are holding consumers from fully trusting this promising technology. We discuss the involvement of a TPA, the security requirements, as well as the vulnerabilities that lead to security threats. We extensively analyze and classify the TPA\'s privacy preserving models into different categories with a focus on their dynamicity. Furthermore, we discuss the characteristics of each TPA model from the privacy-preserving perspective. Finally, we compared our proposed LAPP (Light-weight Accountable Privacy Preserving) with existing known privacy preserving model.



Software And Hardware

• Hardware: Processor: i3 ,i5 RAM: 4GB Hard disk: 16 GB • Software: operating System : Windws2000/XP/7/8/10 Anaconda,jupyter,spyder,flask Frontend :-python Backend:- MYSQL