ISSN : 2349-6657

DETECTION OF DATA LEAKAGE DURING SIMILARITY OUTSOURCING IN CLOUD COMPUTING

R.Gowthami and Dr.R.Maruthamuthu



Cloud computing is sought after for its reduced infrastructure and implementation costs. Following the cloud infrastructure as a Service paradigm and in order to create a flexible management framework. The rise in the usage of cloud computing also gave rise to privacy and security concerns. Concerns like data leakage are pretty common and can affect the original data owners drastically. Many traditional systems Upper Bound Privacy Leakage Constraint-Based approach to identify which intermediate data sets need to be encrypted and which do not .The  method of encryption to hide the data and their respective data sets to ensure privacy and security. This method is not economically feasible as it involves encrypting every data over the cloud which is a huge collection of data. We propose Distributed System management and the Lattice compression Algorithm (LCA) to authenticate the data access from the cloud to ensure the security of the data over cloud and their data sets. Evaluation results demonstrate that the secrecy and privacy of the data stored over the network is achieved efficiently and effectively.

Cloud computing, DSM, LCA

30/08/2019

23

19022

IMPORTANT DAYS

Paper Submission Last Date

Notification of Acceptance

Camera Ready Paper Submission & Author's Registration

Date of Conference

Publication