ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhancing Security of Database Stored in Cloud Environment

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)

Publication Date:

Authors : ; ;

Page : 462-464

Keywords : Privacy preserving data mining; Jenkins hash function encryption algorithm; Cloud computing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing, which refers to an emerging computing model can be defined as set of resources and services provided through the internet with more advantage features such as virtualization, data storage, high expansibility, large amount computation and low cost service. The rapid development in cloud computing has brought data mining in the eyes of researchers as a promising service. The data is outsourced to the third party server by the data owner because of inadequate expertise and computational resources. But the data as well as the association rules of the outsourced database becomes most important property of the data owner. In this paper, we implemented Jenkins hash function encryption algorithm in order to achieve encryption. To provide security, the data owner performs Jenkins hash function encryption scheme and sends data to the server. To recover true pattern of the encrypted data, the data owner will send data mining queries to the server and it will return required pattern. The efficiency of the proposed algorithm is analyzed and compared with the existing algorithm.

Last modified: 2021-06-30 21:46:31