Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 20, No 11 (2022) > Article

DOI: 10.14704/nq.2022.20.11.NQ66169

Modelling a Novel Iterative Information Set Scheme for Safeguarding Confidentiality in Cloud Environment



The cloud computing is an outstanding service-oriented dissemination with voluminous computation assessment and information storage over the linked transmission medium. It communicates the irresistible technology driving the internet-based technology where the users could effortlessly distribute the confidential information for improved assessment and extortion. Moreover, the user-friendly cloud computing services allow the utilization of various applications reasonably. Temporarily effortless information distribution forces diverse confidentiality threats and malware-driven safety risks. Various confidentiality aware applications such as healthcare services over the cloud are created with various inexpensive and processing advantages with the need for improving safety. Therefore complete cybersecurity and improvement against threats are necessary to safeguard the comprehensive information confidentiality. Normally various application-based information sets are anonymized with improved confidentiality to the creators without offering all the confidentiality prerequisites to the freshly appended information. Few modelled schemes drive the problems by re – anonymizing the information sets from the nick. Increased confidentiality safeguarding over iterative information sets over cloud computing is accomplished. Precisely the broadcasting of immense information sets over different storage nodes restricts the confidentiality safeguarding. The intention is to model fresh anonymization schemes to acquire improved confidentiality prerequisites with improved information utilization over the scattered and iterative information sets over the cloud computing. The ability of information confidentiality safeguarding and enhanced safety prerequisites is illustrated using performance analysis.


Cloud Computing, Confidentiality Safeguarding, Confidentiality Aware Applications, Iterative Data Applications, Information Confidentiality and Cyber Security

Full Text