Provably-Secure and Data Mining using Efficient Key Management with Fuzzy Cluster in Hybrid Cloud Database

被引:0
|
作者
Sriprasadh, K. [1 ]
Sivasubramanian, S. [2 ]
机构
[1] Bharath Univ, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Dhanalakshmi Engn Coll, Dept Comp Sci & Engn, Tambaram, India
关键词
Encryption and decryption key; fuzzy cluster; registration key; database;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is deemed to be domain that gives data and assets which are conveyed in means of a support for end-clients more than the global computer network on interest. Distributed storage administration stays away from the price costly on programming, staff support and gives improved execution, a smaller amount of capacity expense and versatility. Yet, sustaining capacity of away information in a protected way is not a simple undertaking in cloud setting and particularly with the intention of putting away information is deemed not to be totally reliable. Cloud conveys administrations through web that expands their presentation to capacity safekeeping susceptibility. Safety is an aspect out of many which contributes to the real disadvantages that maintains a few expansive associations to go into distributed calculating setting. The gist of the paper speaks about two calculations and they are known as CANFIS (Co-Active Neural Fuzzy Interference System) and SCEA (Secure Crypto Encryption). SCEA recommend for an ensured information admittance utilizing effective key administration procedure. CANFIS suggest for data discovery so as to contact transfer document simple to build impeccably. To be precise, the utilization of Co-Active Neural Fuzzy Interference System implies on handling the record in a most brief way to get to specific or required documents. Through this study, researchers try to execute three critical procedures and they are 1.Uploading mass information safely, 2.Entry or Alter immense document, 3.Transfer of substantial record with towering safety. An enormous document is transferred in the distributed space to store as well as it has been scrambled by SCEA calculation for safety reason by the record proprietor. The key pertaining to encryption would be delivered to proprietor mail id. On the off chance that the client gives any information inquiry, the connected documents are shown in view of Co-Active Neural Fuzzy Interference System mining calculation. At the point when the document is gotten to by the client the connection has been delivered to the enrolled mail id of the client and the secret word to get to the record has been delivered to the enlisted contact details of the client via cloud. At that point the client subtle elements have been transferred to the proprietor and the proprietor confirm the client points of interest as well as the key pertaining to the encryption would be sent so as to unscramble the record. At long last the clients get to the document with a colossal safety in excess of private cloud.
引用
收藏
页码:1060 / 1067
页数:8
相关论文
共 50 条
  • [1] Efficient provably-secure hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (41) : 5684 - 5699
  • [2] Efficient provably-secure hierarchical key assignment schemes
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 371 - +
  • [3] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [4] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [5] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Guo, Rui
    Wen, Qiaoyan
    Shi, Huixian
    Jin, Zhengping
    Zhang, Hua
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [6] Efficient provably-secure privacy-preserving signature-based key establishment protocol
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Nikooghadam, Morteza
    AD HOC NETWORKS, 2020, 100
  • [7] Yet another efficient and provably-secure certificateless public key signature scheme without pairing
    School of Mathematics and Computer Engineering, Xihua University, Chengdu, China
    不详
    WRI Int. Conf. Commun. Mob. Comput., CMC, 2010, (51-55):
  • [8] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Rui Guo
    Qiaoyan Wen
    Huixian Shi
    Zhengping Jin
    Hua Zhang
    Journal of Medical Systems, 2013, 37
  • [9] An efficient and provably secure time-limited key management scheme for outsourced data
    Kumar, Naveen
    Tiwari, Shailesh
    Zheng, Zhigao
    Mishra, Krishn K.
    Sangaiah, Arun Kumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (15):
  • [10] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677