alexa Privacy Preserved Data Scheduling For Cloud Data Servi
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Privacy Preserved Data Scheduling For Cloud Data Services

To read the full article Peer-reviewed Article PDF image


Cloud computing provides massive computation power and storage capacity. Cloud enables users to deploy computation and data-intensive applications without infrastructure investment. Intermediate data are generated under the cloud applications and stored to save the cost of recomputing. Adversaries may recover privacy-sensitive information by analyzing multiple intermediate data sets. Encrypted data storage mechanism is used to secure cloud data values. Encrypting all intermediate data sets are neither efficient nor cost-effective one. In data intensive applications encrypt/decrypt operation requires high time and cost. Partial encryption mechanism is used to provide privacy on data with minimum resource levels. The original data and intermediate data are protected with the support of encryption and anonymization techniques. Intermediate data sets in cloud are accessed and processed by multiple parties, but rarely controlled by original data set holders. Encrypting all intermediate data sets will lead to high overhead and low efficiency. Single intermediate data privacy model is used to protect intermediate data under only one node. Multiple intermediate data sets is protected by using joint privacy leakage model. An upper bound privacy leakage constraint-based approach is used to identify which intermediate data sets need to be encrypted. Sensitivity relationship between multiple data set is represented under Sensitive Intermediate data set Graph (SIG). Privacy-Preserving Cost Reducing Heuristic algorithm is used to control privacy leakage in multiple data sets. Multiple intermediate data set privacy models is integrated with data scheduling mechanism. Privacy preservation is ensured with dynamic data size and access frequency values. Storage space and computational requirements are optimally utilized in the privacy preservation process. Data distribution complexity is handled in the scheduling process.

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version