Downloads: 114 | Views: 235
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.3 / 10
Enhancing Security of Database Stored in Cloud Environment
Rajeshkannan.R, T. Saranya
Abstract: Cloud computing, which refers to an emerging computing model can be defined as set of resources and services provided through the internet with more advantage features such as virtualization, data storage, high expansibility, large amount computation and low cost service. The rapid development in cloud computing has brought data mining in the eyes of researchers as a promising service. The data is outsourced to the third party server by the data owner because of inadequate expertise and computational resources. But the data as well as the association rules of the outsourced database becomes most important property of the data owner. In this paper, we implemented Jenkins hash function encryption algorithm in order to achieve encryption. To provide security, the data owner performs Jenkins hash function encryption scheme and sends data to the server. To recover true pattern of the encrypted data, the data owner will send data mining queries to the server and it will return required pattern. The efficiency of the proposed algorithm is analyzed and compared with the existing algorithm.
Keywords: Privacy preserving data mining, Jenkins hash function encryption algorithm, Cloud computing
Edition: Volume 4 Issue 5, May 2015
Pages: 462 - 464
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera