Abstract Proceedings of ICIRESM – 2019
Full conference PDF is available to the subscribed user. Use your subscription login to access,
DETECTION OF DATA LEAKAGE DURING SIMILARITY OUTSOURCING IN CLOUD COMPUTING
Cloud computing is sought after for its reduced infrastructure and implementation costs. Following the cloud infrastructure as a Service paradigm and in order to create a flexible management framework. The rise in the usage of cloud computing also gave rise to privacy and security concerns. Concerns like data leakage are pretty common and can affect the original data owners drastically. Many traditional systems Upper Bound Privacy Leakage Constraint-Based approach to identify which intermediate data sets need to be encrypted and which do not .The method of encryption to hide the data and their respective data sets to ensure privacy and security. This method is not economically feasible as it involves encrypting every data over the cloud which is a huge collection of data. We propose Distributed System management and the Lattice compression Algorithm (LCA) to authenticate the data access from the cloud to ensure the security of the data over cloud and their data sets. Evaluation results demonstrate that the secrecy and privacy of the data stored over the network is achieved efficiently and effectively.
Cloud computing, DSM, LCA
30/08/2019
23
19022
IMPORTANT DAYS
Paper Submission Last Date
October 20th, 2024
Notification of Acceptance
November 7th, 2024
Camera Ready Paper Submission & Author's Registration
November 1st, 2024
Date of Conference
November 15th, 2024
Publication
January 30th, 2025