Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels

Abstract

We propose a structure for protection safeguarding outsourced utilitarian calculation crosswise over substantial scale numerous encoded areas, which we allude to as POFD. With POFD, a client can get the yield of a capacity processed over encoded information from different spaces while ensuring the security of the capacity itself, its info and its yield. In particular, we present two thoughts of POFD, the essential POFD and its improved rendition, keeping in mind the end goal to tradeoff the levels of security insurance and execution. We display three conventions, named Multi-space Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent Calculation protocol (SEC), as the core sub-protocol for POFD to safely process the outsourced work. Point by point security examination demonstrates that the proposed POFD accomplishes the objective of ascertaining a client characterized work crosswise over various scrambled spaces without protection spillage to unapproved parties. Our execution assessments utilizing reenactments exhibit the utility and the productivity of POFD.

Authors and Affiliations

Varrey Dedipya| Dept. of CSE, Eluru college of Engineering and Technology, Eluru, Andhra Pradesh, MounicaBandaru| Dept. of CSE, Eluru college of Engineering and Technology, Eluru, Andhra Pradesh

Keywords

Related Articles

In the time of 21st century quick correspondence arrange, high application administrations like companion topeer (P2P) document sharing, video on request benefits, High Definition Multimedia Television (HDTV), 3DTV...

A New Approach for Node Replica Detection in WSN

Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone. To identify Node clone proposing distributed hash table...

Haze-Assisted Confidentiality Conserving Mobile Health Monitoring

Haze-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approa...

Cloud Assisted Mobile Access of Health Data With Privacy and Audit Ability

Monitoring and advising patients via mobile health care system is the current trend in medical field that acts as a life saver due to its availability at anytime and anywhere. This e-healthcare system requires patien...

Detection and classification of brain tumor using Artificial Neural Network from EEG Images

Brain tumor is an abnormal intracranial growth caused by cells reproducing themselves in an uncontrolled manner. Curing cancer has been a major goal of medical researchers for decades. The early detection of cancer c...

Download PDF file
  • EP ID EP16979
  • DOI -
  • Views 242
  • Downloads 5

How To Cite

Varrey Dedipya, MounicaBandaru (2017). Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels. International Journal of Science Engineering and Advance Technology, 5(7), 741-745. https://europub.co.uk/articles/-A-16979