अमूर्त

Enabling Cost-Effective Privacy Preserving Of Intermediate Sensitive Data Sets in Cloud Using Proxy Re-Encryption Technique

A.Jeeva

Propose an upper bound privacy leakage constraint based approach to find which dataset is need to encrypted. Because encrypting all datasets is very time consuming. Encrypted dataset is outsourced in different cloud providers. The datasets are divided into several parts and stored in different cloud storage. So the privacy preserving cost can be saved. To preserve privacy, the user will encrypt their data and re-encrypted form of data greatly impedes the utilization due to its randomness. So the data stored in cloud only on encrypted form. The data can be accessible only to users with the correct keys. The proxy re-encryption techniques can prevent against the errors and attacks.

अस्वीकृति: इस सारांश का अनुवाद कृत्रिम बुद्धिमत्ता उपकरणों का उपयोग करके किया गया है और इसे अभी तक समीक्षा या सत्यापित नहीं किया गया है।

में अनुक्रमित

Index Copernicus
Academic Keys
CiteFactor
Cosmos IF
RefSeek
Hamdard University
World Catalogue of Scientific Journals
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

और देखें