An Anonymity-Based Secure and Preserving Data in Social Networks Using Cloud  
  Authors : P. Preethi; K. Narayana


Presently the mankind are progressively relying much more about a number of online storage stores to backup our data and making use of it instantly which provides an anywhere, anytime access. Every one of these services bring by using it, concerns of security and privacy weaknesses for the services given by them because the user's data are stored and maintained beyond user's premises. Our main focus could be securing privacy of information in social network by utilizing anonymity techniques. In this particular paper algorithms are discussed for anonymous sharing of private data among N parties. Iterative strategy is used to ensure that ID numbers are utilized starting from 1 to N. This assignment is anonymous for the reason that the identities received are unknown towards the other members from the group.


Published In : IJCAT Journal Volume 1, Issue 7

Date of Publication : 31 August 2014

Pages : 378 - 381

Figures :01

Tables : --

Publication Link : An Anonymity-Based Secure and Preserving Data in Social Networks Using Cloud




P. Preethi : Post-Graduate Student, Department of Computer Science and Engineering, SIT, PUTTUR, India

K. Narayana : Head & Associate Professor, Department of computer Science and Engineering, SIT, PUTTUR, India









deanonymization cloud

distributed computing systems

The actual suggested system should be to secure privacy of shared data by Anonymous ID Assignment, by implementing discussed algorithms. This system effectively preserves both information utility and individual’s privacy. Privacy preserving keeps growing field of research. It can be clear that we now have much privacy preserving techniques available however they have got shortcomings. Anonymity technique gives privacy protection and usability of knowledge. This system will secure anonymous sharing of private data by anonymous ID assignment.










[1] Denis Reilly, Chris Wren, Tom Berry, “Cloud Computing_Pros and Cons for Computer Forensic Investigations” International Journal Multimedia and Image Processing (IJMIP), Volume 1, Issue 1, March 2011

[2] Information Commissioner’s office, “Anonymization: managing data protection risk, code of practice”, 2012

[3] Tomas Isdal, Michael Piatek, Arvind Krishnamurthy, Thomas Anderson: “Privacy-preserving P2P data sharing with OneSwarm”.

[4] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.5. A. Friedman, R. Wolff, and A. Schuster, “Providing k-anonymity in data mining,” VLDB Journal, vol. 17, no. 4, pp. 789– 804, Jul. 2008.

[5] Jayalatchumy, D., Ramkumar, P., & Kadhirvelu, D. 2010, November. Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm. In Emerging Trends in Engineering and Technology (ICETET), pp. 456-461

[6] Ruj, S., Stojmenovic, M., & Nayak, A. 2012, May. Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In Cluster, Cloud and Grid Computing (CCGrid),12th IEEE/ACM International Symposium on(pp. 556-563). IEEE.

[7] Liu, Q., Wang, G., & Wu, J. 2009, August. An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 2, pp. 715-720). IEEE.

[8] Sayi, T. J. V. R. K., Krishna, R. S., Mukkamala, R., & Baruah, P. K. 2012. Data Outsourcing in Cloud Environments: A Privacy Preserving Approach. In Information Technology: New Generations (ITNG), 2012 Ninth International Conference on (pp. 361-366).

[9] Shah, M. A., Baker, M., Mogul, J. C., & Swaminathan, R. 2007, May. Auditing to keep online storage services honest. In Proceedings of the 11th USENIX workshop on Hot topics in operating systems (pp. 1-6). USENIX Association.

[10] Yang, K., & Jia, X. 2012. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4), 409-428.

[11] Chen, L., & Guo, G. 2011. An efficient remote data possession checking in cloud storage. International Journal of Digital Content Technology and its Applications, 5(4), 43-50.

[12] Gohel, M., & Gohil, B. 2012. A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage. Trust Management VI, 240-246.

[13] Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Trans. on, 22(5), 847-859.

[14] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., ... & Song, D. 2011. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14(1), 12.

[15] Hao, Z., Zhong, S., & Yu, N. 2011. A privacypreserving remote data integrity checking protocol with data dynamics and public verifiability. Knowledge and Data Engineering, IEEE Transactions on, 23(9), 1432-1437.