Abstract
Design an encryption of privacy preserving and scheduling of intermediate datasets in cloud. Implemenation of encryption is done as follows: Identification of intermediate datasets that needs to be encrypted. Based on frequent pattern mining the least frequent intermediate datasets are encrypted. Perform column level encryption to the sensitive information. Predicting the data based on inference analysis would not be possible. So that the data will be secure when compared to the existing system.
Cite
CITATION STYLE
Cloud Based Privacy Preserving Dynamic Intermediate Datasets. (2020). International Journal of Engineering and Advanced Technology, 9(4), 2141–2143. https://doi.org/10.35940/ijeat.d8380.049420
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.