Enhancing Security of Database Stored in Cloud Environment
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 5)Publication Date: 2015-05-05
Authors : Rajeshkannan.R; T. Saranya;
Page : 462-464
Keywords : Privacy preserving data mining; Jenkins hash function encryption algorithm; Cloud computing;
Abstract
Cloud computing, which refers to an emerging computing model can be defined as set of resources and services provided through the internet with more advantage features such as virtualization, data storage, high expansibility, large amount computation and low cost service. The rapid development in cloud computing has brought data mining in the eyes of researchers as a promising service. The data is outsourced to the third party server by the data owner because of inadequate expertise and computational resources. But the data as well as the association rules of the outsourced database becomes most important property of the data owner. In this paper, we implemented Jenkins hash function encryption algorithm in order to achieve encryption. To provide security, the data owner performs Jenkins hash function encryption scheme and sends data to the server. To recover true pattern of the encrypted data, the data owner will send data mining queries to the server and it will return required pattern. The efficiency of the proposed algorithm is analyzed and compared with the existing algorithm.
Other Latest Articles
- Regulation of Combined Harvesting of an Inshore-Offshore Fishery by Taxation
- Reconfigurable FPGA Implementation of FIR Filter using Modified DA Method
- Position Control of Hybrid Stepper Motor Using PIC16F877A Microcontroller
- Overview of ZigBee based WSN
- Study on Capital Participation of Kutai Kartanegara Government into Bankaltim
Last modified: 2021-06-30 21:46:31