An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud
P Raja Sekhar Reddy1, K Ravindranadh2

1P Raja Sekhar Reddy*, Research Scholar., KLEF, Vaddeswaram, AP, India.
2K Ravindranadh, CSE, KLEF, Vaddeswaram, AP, India. 

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1190-1198 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4028119119/2019©BEIESP | DOI: 10.35940/ijitee.A4028.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cloud service is the most popular environment utilized by millions of users for different kind of service utilization. Cloud services needs to be provided with the concern of satisfying user requirements to increase their popularity level. The main issues associated with cloud service handling are maintaining integrity of data, user management, secured data transmission and so on. These issues are addressed by various authors by introducing the different methodologies. In this analysis work, discussion about those research techniques has been given with the detailed explanation. This paper provides the overview about the different research techniques whose main goal is to achieve the increase the data integrity level of the shared data. This paper also provides the discussion about various dynamic grouping techniques which tends to provide more flexible access to the user revocation. Different research techniques proposed by various authors has been described and compared their performance in terms of merits and demerits each research technique. The overall evaluation of the research technique is done based on numerical outcome present in each research technique and best research technique has been found
Keywords: Cloud Services, Data Integrity, user Privacy Requirements, Authentication, User Revocation, Dynamic Grouping
Scope of the Article: Requirements Engineering