Protective Speculation Clouds With Valuable Cost

Abstract

In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied Access control systems .It will be that as it may, when touchy information's is given and a Protection speculation is not set up, an approved client can even now surrender the protection of a man prompting interesting disclosure. Preserving the protective of the intermediate data sets is a challenging problem because adversaries may recover sensitive information by analyzing multiple intermediate data sets A Protective speculation can utilize concealment and speculation of social information to anonymize and fulfill protection need, e.g., k-secrecy and l-differing qualities. This type of works in any case, security is accomplished at the expense of accuracy of approved information. in existing approaches to address this challenges. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time reducing and costly for data-intensive applications to end decrypt data sets frequently while performing any operation on them In this paper, we propose a so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermed iate data sets can be significantly reduced with our approach over existing once where all data sets are encrypted.

Authors and Affiliations

Maddirala Kaveri, Uppalapati Srilakshmi

Keywords

Related Articles

Design of Punctuality Enhanced Bus Transportation System Using GSM and Zigbee

Public traffic system depends mainly on driver’s manual operation, which will encounter many problems regarding the punctuality of the bus’s arrival and departure of the bus at bus stations. Paper proposes a supervi...

Secured Architecture To Access Cloud Based Services

Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...

Integrated Data Mining Approach for Security Alert System

The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terro...

A Framework for Refusal DDOS Attack Location Procuring Into Account Multivariate Relationship Assessment

This paper discussed the consequences of MCA on the Distributed DoS discovery and recommends an illustration, a covariance examination model for recognizing SYN flooding assaults. The impersonation final results demo...

A Survey on Distributed Network Services Using SSO for Secure Mechanism

Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...

Download PDF file
  • EP ID EP28288
  • DOI -
  • Views 274
  • Downloads 3

How To Cite

Maddirala Kaveri, Uppalapati Srilakshmi (2015). Protective Speculation Clouds With Valuable Cost. International Journal of Research in Computer and Communication Technology, 4(10), -. https://europub.co.uk/articles/-A-28288