Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing.
K. Mohana PrabhaP. Vidhya SaraswathiPublished in: Comput. Commun. (2020)
Keyphrases
- data access
- cloud computing
- factor authentication
- data management
- data privacy
- data sharing
- trusted computing
- privacy protection
- privacy preserving
- security issues
- data storage
- data center
- private information
- sensitive data
- service providers
- database management systems
- distributed computing
- data processing
- query processing
- smart card
- database applications
- database systems
- privacy preserving data mining
- mobile terminals
- data integration
- database
- data warehouse
- computing platform
- application development
- databases
- information security
- low cost
- privacy concerns
- multimedia data
- data objects
- data quality
- management system
- sql server