ISSN 2063-5346
For urgent queries please contact : +918130348310


Main Article Content

Ekta Sabbarwal1 , Daya Shankar Pandey2
» doi: 10.48047/ecb/2023.12.9.110


As in today's era, everything is moving towards digitalization. Emerging in technology creates every organization has its Enterprise Resource Planning Tools. In India or any country, every data of any organization is controlled by its ERP. As when we deal with the data of any organization, there are many different users and we need to control data privacy to users. We need to control, maintain, and regulate the data as per the user requirements and as per the data authorized to the N user. So one organization needs to focus on the privacy of the data or the services concerning the users. So that no user can either underutilizes the data or services nor over-utilizes the data or services. One user can efficiently use authorized resources and services. As mostly the privacy and security of any organization data or services are disturbed by attacking the system. Usually, the attacks are of two types Active attacks and passive attacks. Usually when someone tries to attack the privacy of the model then security also disturbs. So we can say that security and privacy are hand by hand concerns. In active attacks, the attacker tries to manipulate the data or services whereas in passive attacks the attacker observes the data or the service and uses it in a wrong way. So there are basically two possible places where the attacker can raise the threat one is the communication channel and the second is the server. So need a model which can easily handle these issues to maintain the privacy of any ERP. The proposed model aims to provide an Effective and Secure Privacy-Preserving Technique for Cloud ERP so we named the proposed model as ESPP (Effective and Secure PrivacyPreserving) Model. The proposed model focus on providing an architecture that can't be attacked easily so that it's privacy will remain preserved. The proposed system focus on controlling the user and the data transmission to reduce the threats to privacy.

Article Details