Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels

Abstract

We propose a structure for protection safeguarding outsourced utilitarian calculation crosswise over substantial scale numerous encoded areas, which we allude to as POFD. With POFD, a client can get the yield of a capacity processed over encoded information from different spaces while ensuring the security of the capacity itself, its info and its yield. In particular, we present two thoughts of POFD, the essential POFD and its improved rendition, keeping in mind the end goal to tradeoff the levels of security insurance and execution. We display three conventions, named Multi-space Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent Calculation protocol (SEC), as the core sub-protocol for POFD to safely process the outsourced work. Point by point security examination demonstrates that the proposed POFD accomplishes the objective of ascertaining a client characterized work crosswise over various scrambled spaces without protection spillage to unapproved parties. Our execution assessments utilizing reenactments exhibit the utility and the productivity of POFD.

Authors and Affiliations

Varrey Dedipya| Dept. of CSE, Eluru college of Engineering and Technology, Eluru, Andhra Pradesh, MounicaBandaru| Dept. of CSE, Eluru college of Engineering and Technology, Eluru, Andhra Pradesh

Keywords

Related Articles

A Complete System To Securely Outsource Log Records To A Cloud Provider

In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try No...

Web based online Home Automation and security system based on wireless Video Streaming using Internet of Things

The present research work proposes an efficient implementation for IoT (Internet of Things) used for monitoring and controlling the home appliances via World Wide Web. IoT can be viewed as an evolution rather than a...

A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice

DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...

Finite Element Analysis of Wire Drawing Process with different die contours

Finite element method is a numerical analysis tool for analyzing complex problems. It was originally developed as a tool for structural, Thermal; fluent analysis and magnetic, electrical current flow analysis but the...

A high Step-up DC-DC Converter employs Cascading CockcroftWalton Voltage Multiplier by omitting Step-up Transformer

In my paper possess a high voltage gain and devoid of using Step up transformer through a high step-up DC-DC converter based on Cockcroft-Walton (CW) voltage multiplier. Here the input was in low to DC voltage is boo...

Download PDF file
  • EP ID EP16979
  • DOI -
  • Views 266
  • Downloads 5

How To Cite

Varrey Dedipya, MounicaBandaru (2017). Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels. International Journal of Science Engineering and Advance Technology, 5(7), 741-745. https://europub.co.uk/articles/-A-16979