Authors: Sasidevi Jayaraman; Sugumar Rajendran; Shanmuga Priya P
Addresses: Department of Computer Science and Engineering, St. Peter's University, Chennai, India ' Department of Computer Science and Engineering, St. Peter's University, Chennai, India ' Department of Computer Science and Engineering, St. Peter's University, Chennai, India
Abstract: Cloud computing is the distribution of computing devices which reduce the cost for IT infrastructure. In this projected approach, the databases are measured to collecting method generate the transitional datasets. These datasets acquire the facts increase to pick the responsive data to the encryption and decryption procedure, the responsive data preferred procedure depend upon the entry value. The facts increase is integrated to get the superior bound limitation for the combined maintaining outflow. Responsive data to the elliptic curve cryptography (ECC) system to encrypt the data to isolation procedure. Encrypted data storage system is utilised to protected cloud data standards. Encrypting every transitional data sets are neither competent nor rate effectual one. From the trial outcome, the isolation defending charge of transitional datasets can be appreciably condensed by our method above obtainable ones where the entire datasets are encrypted.
Keywords: cloud computing; intermediate datasets; privacy preserving; encryption; decryption; cryptography; clustering.
International Journal of Business Intelligence and Data Mining, 2019 Vol.15 No.3, pp.273 - 287
Received: 15 Apr 2017
Accepted: 19 Jun 2017
Published online: 04 Jul 2019 *