Advances, Systems and Applications
Author (year)/Criteria | Factors of Data Privacy | Methodology used | Advantages of the proposed model |
---|---|---|---|
J. Schiffman (2010) [24] | Authorization, Authentication, Trustworthiness, Confidentiality, Availability, Integrity | Verifying a Multi-layer System | Mulit layer system help to achive privacy in better way |
Z. Mahmood (2011) [23] | Access Control, Authentication, Integrity | A hybrid technique is proposed for data confidentiality and integrity | Confidentiality and integrity are used efficiently |
Sun, Y (2014) [25] | Access Control, Authentication, Trustworthiness, Confidentiality, Availability | Privacy-preserving multi keyword ranked search approach | Access Control, Authentication, are assured and ranking has been given |
Jakimoski, K. (2016) [26] | Authorization, Authentication, Integrity | Proposed security technique for confidentiality in cloud computing | Confidentially, Access Control are highlighted |
Ning, J. (2017) [27] | Access Control, Trustworthiness, Integrity | Proposed system is resistant to key leakage attacks | Trustworthiness, Integrity are important to assure data privacy and avoid attacks |
Roy, S. (2018) [28] | Access Control, Authorization, Trustworthiness, Integrity | Proposed fine-grained access control over cloud-based multi-server data along with a provably | One of the major advantage is On-demand access control to the cloud services |
Yang, C. (2020) [29] | Access Control, Authorization, Trustworthiness, Integrity Availability | Proposed a cloud data deletion protocol to solve the behavior of tampering users by tampering with data deletion results when cloud server is not trusted | Used to avoid tempering of data that assures Confidentiality, Integrity, Availability, Authenticity |
Suresha, K. (2021) [30] | Access Control, Authentication, Confidentiality, Integrity Availability | Proposed a system that uses attribute based encryption technique, threshold secret sharing and multi-authority access control mechanism | Attributed based encryption technique has been used |
Ahmadi, S (2022) [31] | Authorization, Authentication, Confidentiality, Integrity | Highlighted Privacy-Preserving Cloud Computing | Authorization, Authentication has been higileghted |
Qiwen Li, (2023) [32] | Authorization, Authentication, Confidentiality, Integrity | Homomorphic encryption technique | Using Authentication, Confidentiality, Integrity addresses Homoporpic encryption |