Provably-Secure and Data Mining using Efficient Key Management with Fuzzy Cluster in Hybrid Cloud Database

被引:0
|
作者
Sriprasadh, K. [1 ]
Sivasubramanian, S. [2 ]
机构
[1] Bharath Univ, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Dhanalakshmi Engn Coll, Dept Comp Sci & Engn, Tambaram, India
关键词
Encryption and decryption key; fuzzy cluster; registration key; database;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is deemed to be domain that gives data and assets which are conveyed in means of a support for end-clients more than the global computer network on interest. Distributed storage administration stays away from the price costly on programming, staff support and gives improved execution, a smaller amount of capacity expense and versatility. Yet, sustaining capacity of away information in a protected way is not a simple undertaking in cloud setting and particularly with the intention of putting away information is deemed not to be totally reliable. Cloud conveys administrations through web that expands their presentation to capacity safekeeping susceptibility. Safety is an aspect out of many which contributes to the real disadvantages that maintains a few expansive associations to go into distributed calculating setting. The gist of the paper speaks about two calculations and they are known as CANFIS (Co-Active Neural Fuzzy Interference System) and SCEA (Secure Crypto Encryption). SCEA recommend for an ensured information admittance utilizing effective key administration procedure. CANFIS suggest for data discovery so as to contact transfer document simple to build impeccably. To be precise, the utilization of Co-Active Neural Fuzzy Interference System implies on handling the record in a most brief way to get to specific or required documents. Through this study, researchers try to execute three critical procedures and they are 1.Uploading mass information safely, 2.Entry or Alter immense document, 3.Transfer of substantial record with towering safety. An enormous document is transferred in the distributed space to store as well as it has been scrambled by SCEA calculation for safety reason by the record proprietor. The key pertaining to encryption would be delivered to proprietor mail id. On the off chance that the client gives any information inquiry, the connected documents are shown in view of Co-Active Neural Fuzzy Interference System mining calculation. At the point when the document is gotten to by the client the connection has been delivered to the enrolled mail id of the client and the secret word to get to the record has been delivered to the enlisted contact details of the client via cloud. At that point the client subtle elements have been transferred to the proprietor and the proprietor confirm the client points of interest as well as the key pertaining to the encryption would be sent so as to unscramble the record. At long last the clients get to the document with a colossal safety in excess of private cloud.
引用
收藏
页码:1060 / 1067
页数:8
相关论文
共 50 条
  • [11] A Secure Data Transfer Approach With an Efficient Key Management Over Cloud
    Gupta, Lalit Mohan
    Garg, Hitendra
    Samad, Abdus
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2022, 17 (01)
  • [12] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [13] A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems
    Amintoosi, Haleh
    Nikooghadam, Mahdi
    2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, : 85 - 90
  • [14] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [15] Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud
    Wang, Zhiwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 770 - 776
  • [16] Provably secure public key encryption with keyword search for data outsourcing in cloud environments
    Ghosh, Sudeep
    Islam, S. K. Hafizul
    Bisht, Abhishek
    Das, Ashok Kumar
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [17] A secure and lightweight cloud data deduplication scheme with efficient access control and key management
    Tang, Xinyu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Jiang, Xueru
    Liu, Yining
    COMPUTER COMMUNICATIONS, 2024, 222 : 209 - 219
  • [18] An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    Li, Yuangang
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 112 - 121
  • [19] Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems
    Yang, Kan
    Shu, Jiangang
    Xie, Ruitao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 71 - 84
  • [20] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160