Effective Crypto Systemfor Achieving Security and Performance over Market Basket Data Analysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 6
Abstract
Abstract:Nowadays Cloud computing plays a vital role in diverseareaslike Personal Health,Social applications,enterprise,Finacial and Public domains etc., Security is an important province in as far as cloudcomputing is concerned , Nevertheless one of the biggest issues is while implementing cloud remains data security i.e Leading data integrity and Privacy plays a Keyrole. In this connection,secure cryptographic algorithms could be used to ensure the data privacy such as play fair cipher.In this paper, we focus on to explore efficient cryptographic algorithm for protecting cloud data over homomorphic encryption scheme and also explore the Keymanagement and system performance for market basket analysis i.e on customerpurchased product data.
Authors and Affiliations
N. Swetha, , Prof. S Ramachandram
EEG Subband Analysis using Approximate Entropy for the Detection of Epilepsy
Abstract: Epilepsy is a neurological disorder which affects the nervous system. Epileptic seizures are due tosudden hyperactivity in certain parts of the brain. Electroencephalogram (EEG) is the commonly used modal...
Multi-Party Access Control Mechanism in Online Social Networks
Abstract: Social networking is an essential part of life for people around the world these days. Social networking is a form of social media, used for interactive, educational, informational or entertaining purpo...
“The Impact Of Incentives To Indigenous Farmers (A1 And A 2) In Maize Production In Zimbabwe” A Case Of Mashonaland East Province, Macheke, Zimbabwe.
Abstract: The current study was concerned with the need to establish incentives for farmers to boostproduction of maize in Macheke, Mashonaland East Province, in Zimbabwe. This study was motivated by anobservation that t...
Steganography Techniques Used To Hide the Information
Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...
Testing By Application Software On-Brute Force Attack On Open Functionality Secured
.