A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment

Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a cloud environment using intelligent agent. This paper presents an intelligent model to protect user’s valuable personal data. Preserving proprie...

Full description

Saved in:
Bibliographic Details
Published in:Egyptian informatics journal Vol. 16; no. 1; pp. 151 - 166
Main Authors: Chandramohan, Dhasarathan, Sathian, Dananjayan, Rajaguru, Dayalan, Vengattaraman, Thirumal, Dhavachelvan, Ponnurangam
Format: Journal Article
Language:English
Published: Elsevier B.V 01-03-2015
Elsevier
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a cloud environment using intelligent agent. This paper presents an intelligent model to protect user’s valuable personal data. Preserving proprietor’s data and information in cloud is one of the top most challenging missions for cloud provider. Many researches fanatical their valuable time’s to discover some technique, algorithms and protocols to solve secrecy issue and develop a full-fledged cloud computing standard structure as a newest computing to all cloud users. Some researchers came forward with cryptography technique, cyber middle wear technique, noise injection and third party layer technique to preserve privacy about data in cloud. We propose a hybrid authentication technique as an end point lock. It is a composite model coupled with an algorithm for user’s privacy preserving, which is likely to be Hash Diff Anomaly Detection and Prevention (HDAD). This algorithmic protocol acts intelligently as a privacy preserving model and technique to ensure the users data are kept more secretly and develop an endorsed trust on providers. We also explore the highest necessity to maintain the confidentiality of cloud user’s data.
ISSN:1110-8665
2090-4754
DOI:10.1016/j.eij.2015.02.002