Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud Online publication date: Mon, 02-Sep-2019
by Sasidevi Jayaraman; Sugumar Rajendran; Shanmuga Priya P
International Journal of Business Intelligence and Data Mining (IJBIDM), Vol. 15, No. 3, 2019
Abstract: Cloud computing is the distribution of computing devices which reduce the cost for IT infrastructure. In this projected approach, the databases are measured to collecting method generate the transitional datasets. These datasets acquire the facts increase to pick the responsive data to the encryption and decryption procedure, the responsive data preferred procedure depend upon the entry value. The facts increase is integrated to get the superior bound limitation for the combined maintaining outflow. Responsive data to the elliptic curve cryptography (ECC) system to encrypt the data to isolation procedure. Encrypted data storage system is utilised to protected cloud data standards. Encrypting every transitional data sets are neither competent nor rate effectual one. From the trial outcome, the isolation defending charge of transitional datasets can be appreciably condensed by our method above obtainable ones where the entire datasets are encrypted.
Online publication date: Mon, 02-Sep-2019
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Business Intelligence and Data Mining (IJBIDM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com