8 research outputs found

    Privacy Preserving Data Mining using Jaya based Genetic Algorithm

    Get PDF
    Privacy protection has emerged as a key concern in the field of data mining because of the rise in the sharing of sensitive data across networks among organizations, governments, and other parties. For   knowledge extraction from these huge set of data, association rule mining is used to analyze the patterns of data. For a variety of optimization issues encountered in the real world, evolutionary algorithms (EAs) offer efficient solutions. The available EA solutions in the privacy-preserving area are limited to specific issues like cost function evaluation. Here, a JAYA based Genetic algorithm has been proposed for privacy preservation.“JAYA” means victory a word from Sanskrit origin..This algorithm doesn't need any parameters that are specific to it and it moves towards best solution avoiding the worst. Hence the name Jaya. Jaya based genetic algorithm is applied to original dataset of chromosomes. Privacy preservation is achieved by comparing the support of original dataset of chromosome with the simulation output

    Load Balancing By Cloud Computing

    Get PDF
    With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable multi-cloud environment. This paper addresses the issues in multi-cloud environment and also provides a way to provide better security in multi-cloud environment. Further it discusses the different encryption algorithms that can be used to maintain a design framework for cloud environment

    Privacy-Preserving in Cloud Computing with Security-as-a-Service

    Get PDF
    Cloud computing is on-demand delivery of data and IT resources in which applications are rapidly provisioned as standardized offerings to users over the web. In the recent years Cloud Computing has grown significantly, it became an important area of research and one of the vital areas in the redevelopment of the infrastructure of information technology. Cloud Computing has been classified into several models based on the type of service provided to customers. Cloud Computing has many benefits, as well as, it has many challenges and concerns such as: security, privacy, data integrity and other problems that make users and organizations fear to dealing with it. The main problem in Cloud Computing is the security of data. The proposed work focuses on secure data transfer by using different combination of mechanisms which not only ensure multi tier authenticities but also maintain the confidentiality of data and integrity of message in terms of authenticity, confidentiality and integrity of data. The proposed system aims to store data in a secure and safe way in order to avoid intrusions and attacks. Also, it will reduce the cost and time to store the encrypted data in the Cloud Computing. In this paper, ECC encryption and decryption algorithm has been proposed to maintain the confidentiality of data in transfer. The same algorithm is implemented in cloud architecture and is compared with the conventional RSA algorithm

    Providing Security in Multi-Cloud Environment with Secure Sharing Over Network

    Get PDF
    With the web getting so well-known information sharing and security of individual information has increase a great deal more significance than some time recently. Cloud gives and effective approach to outsource the information either on the web or disconnected yet information security gets to be one of the real issues in untrustworthy cloud environment. The proposed framework addresses the security issues in cloud environment furthermore gives an approach to give better security in cloud environment. The proposed framework utilizes cryptographic symmetric calculation AES with key size of 256 for information encryption and Ultra Zip pressure which gives a pressure proportion up to half contingent upon the document sort. After encryption and pressure the information is splitted into various parts and every part is put away in isolated information server. The proposed work can be utilized as a part of various application like person to person communication destinations and document facilitating sites

    Designing Security Model for Un-Reliable Cloud IAAS Storage

    Get PDF
    With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable cloud environment. The proposed system addresses the security issues in cloud environment and also provides a way to provide better security and load balancing in cloud environment. The proposed system uses cryptographic symmetric algorithm AES with key size of 256 for data encryption and Ultra Zip compression which provides a compression ratio up to 50% depending on the file type. After encryption and compression the data is splitted into multiple parts and each part is stored in separate data server. The proposed work can be used in many different application like social networking sites and file hosting websites

    A Review on Issues in Cloud Computing Services

    Get PDF
    With the internet getting so popular data sharing and security of personal data has gain much more importance than before. Cloud provides and efficient way to outsource the data either online or offline but data security becomes one of the major issues in unreliable multi-cloud environment. This paper addresses the issues in multi-cloud environment and also provides a way to provide better security in multi-cloud environment. Further it discusses the different encryption algorithms that can be used to maintain a design framework for cloud environment

    Privacy Preserving Cryptographic Protocols for Secure Heterogeneous Networks

    Get PDF
    Disertační práce se zabývá kryptografickými protokoly poskytující ochranu soukromí, které jsou určeny pro zabezpečení komunikačních a informačních systémů tvořících heterogenní sítě. Práce se zaměřuje především na možnosti využití nekonvenčních kryptografických prostředků, které poskytují rozšířené bezpečnostní požadavky, jako je například ochrana soukromí uživatelů komunikačního systému. V práci je stanovena výpočetní náročnost kryptografických a matematických primitiv na různých zařízeních, které se podílí na zabezpečení heterogenní sítě. Hlavní cíle práce se zaměřují na návrh pokročilých kryptografických protokolů poskytujících ochranu soukromí. V práci jsou navrženy celkově tři protokoly, které využívají skupinových podpisů založených na bilineárním párování pro zajištění ochrany soukromí uživatelů. Tyto navržené protokoly zajišťují ochranu soukromí a nepopiratelnost po celou dobu datové komunikace spolu s autentizací a integritou přenášených zpráv. Pro navýšení výkonnosti navržených protokolů je využito optimalizačních technik, např. dávkového ověřování, tak aby protokoly byly praktické i pro heterogenní sítě.The dissertation thesis deals with privacy-preserving cryptographic protocols for secure communication and information systems forming heterogeneous networks. The thesis focuses on the possibilities of using non-conventional cryptographic primitives that provide enhanced security features, such as the protection of user privacy in communication systems. In the dissertation, the performance of cryptographic and mathematic primitives on various devices that participate in the security of heterogeneous networks is evaluated. The main objectives of the thesis focus on the design of advanced privacy-preserving cryptographic protocols. There are three designed protocols which use pairing-based group signatures to ensure user privacy. These proposals ensure the protection of user privacy together with the authentication, integrity and non-repudiation of transmitted messages during communication. The protocols employ the optimization techniques such as batch verification to increase their performance and become more practical in heterogeneous networks.

    Efficient Security Solution for Privacy-Preserving Cloud Services

    No full text
    Abstract — The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user identification and secure communication. Our solution provides only registered users to access cloud services. Our solution offers anonymous authentication. This means that users ’ personal attributes (age, valid registration, successful payment) can be proven without revealing users ’ identity. Our solution offers secure communication of transmitted data
    corecore