International Journal of Computer Science and Mobile Computing (IJCSMC)
In this paper, the authors explain all the theoretical results related to privacy and security of cloud computing. They have implemented all these parameters in the form of basic cloud application and its deployment. Basically they have implemented attribute driven security model for cloud computing. Their application is able to resist the attacks from various fields over confidentiality, integrity, availability, accountability, and privacy-preservability. Because these are the most attacked parameters in cloud computing. Cloud computing provides innumerable benefits to its customers but it fails to solve information security concerns especially in public cloud.