SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014)
47
Privacy Preserving Based Cloud Storage System
V.Shravani T.V.Ramanamma
M.Tech Scholar Sr.Asst.Professor
Aurora's Technological & Research Institute Aurora's Technological & Research Institute
Uppal, Hyderabad. Uppal, Hyderabad.
Abstract: Cloud computing provides huge computation power
and storage capability that alter users to deploy computation and
data-intensive applications while not infrastructure
investment. on the process of such applications, an
oversized volume of intermediate knowledge sets are going to
be generated, and sometimes hold on to avoid wasting the
value of re computing them. However, protective the privacy of
intermediate knowledge sets becomes a difficult drawback as a
result of adversaries could recover privacy-sensitive data by
analyzing multiple intermediate knowledge sets. Encrypting all
knowledge sets in cloud is wide adopted in existing approaches to
deal with this challenge.however we tend to argue that
encrypting all intermediate knowledge sets square measure
neither economical nor efficient as a result of it’s terribly time
intense and dear for knowledge intensive applications to encrypt
or decrypt data sets where as play acting any operation on them.
During this paper, we tend to propose a complete unique bound
privacy outflow constraint based approach to spot that
intermediate knowledge sets ought to be encrypted and that
don’t, so privacy preserving value may be saved where as the
privacy needs of information holders will still be happy. Analysis
results demonstrate that the privacy preserving value of
intermediate knowledge sets may be considerably reduced with
our approach over existing ones wherever all knowledge sets
square measure encrypted.
Keywords: - Cloud computing, data storage privacy, privacy
preserving, intermediate data set, privacy upper bound
1. INTRODUCTION
We think about applications wherever the first sensitive
knowledge can't be is composed. Perturbation may be a
terribly helpful technique wherever the information is changed
and created "less sensitive" before being two-handed to
agents. One will add random noise to bound attributes, or
one will replace actual values by ranges. However, n some
cases it's vital to not alter the first distributor's knowledge.
For instance, if Associate in nursing outsourcer is doing our
payroll, he should have the precise earnings and client
checking account numbers. If medical researchers are going to
be treating patients (as hostile merely computing
statistics), they will would like correct knowledge for the
patients. Historically, discharge detection is handled by
watermarking. e.g., a singular code is embedded in every
distributed copy. If that replicate is later discovered within
the hands of Associate in nursing unauthorized party,
the informant are often known. Watermarks are
often terribly helpful in some cases, but again, involve some
modification of the first knowledge. Moreover, watermarks
will typically be destroyed if the information recipient is
malicious. knowledge discharge are often detailed as
in once a knowledge a knowledge an information} distributor
has given sensitive data to a group of purportedly trustworthy
agents and a few of the information is leaked and located in
associate in nursing enterprise knowledge leak may be a
shivery proposition. Security practitioners
have continually had to trot out knowledge discharge
problems that arise from numerous ways that like email,
and different net channels. Justin case of knowledge discharge
from trustworthy agents, the distributor should assess the
chance that the leaked knowledge came from one
or additional agents.
This can be done by employing a system which may
establish those parties World Health Organization area
unit guilty for such discharge even once knowledge is altered.
For this the system will use knowledge allocation are also can
inject realistic however fake knowledge record to enhance
identification of discharge. Moreover, knowledge also can be
leaked from inside a corporation through mails.
There's conjointly a requirement to filter these e-mails. This
will be done by interference emails that contain pictures,
videos or sensitive knowledge for a corporation.
Principle utilized in e- mail filtering is we tend to classify e-
mail primarily based the fingerprints of message bodies, the
white and black lists of email addresses and also the words
specific to spam.
2. PREVIOUS SYSTEM
In Existing system, watermarking technique is
employed to spot the guilty agents World Health
Organization area unit unseaworthy the sensitive info or
information. Watermarking is one in all previous techniques
that contain a novel code. This distinctive code is embedded
in every copy that is then distributed to the purchasers by the
user.
LIMITATIONS:
However, in some cases it's vital to not alter the
initial distributor’s information. Traditionally, cloud discharge
detection is handled by watermarking, e.g., a novel code is
embedded in every distributed copy. If that duplicate is later
discovered within the hands of associate degree unauthorized
party, the informant will be known. Water marks will be
terribly helpful in some cases, but again, involve some
modification of the initial information. Watermarks will
generally be destroyed if the info recipient is malicious.
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014)
48
3. PROPOSED SYSTEM
The main aim of the projected system is to seek
out out once and UN agency has leaked the
sensitive information. Within the projected system; it's
getting to implement the thought of "Fake
Objects". currently if suppose the director of the
corporate needs to share some sensitive information (records)
with shoppers of his company however he doesn't wish his
information to be leaked anyplace in between. There fore
before causation the sensitive information to
the shoppers what the projected system can do
is it'll add faux objects (record) in information which
can precisely appear as
if original information. The shopper is going to be unaware of
those faux objects.
The system goes to use totally different modules for
adding faux objects and or detection faux objects.
Additionally implementation thought of email filtering
module during which if agent tries to e-mail the sensitive
information, the mail are going to be sent in Associate in
Nursing secret writing format by exploitation cryptography.
And also the information’s keep within the data set are going
to be in encrypted format. If the agent tries to send the info to
shopper suggests that the info are going to be send as
encrypted data’s, At same time the owner of the organization
additionally can get identical mail that the agent
leaks. However agents don’t understand that, however the
owner of the corporate will read the first information that is
leaked.
ADVANTAGES
• We additionally gift algorithms for distributing objects to
agents, in an exceedingly manner that improves our
possibilities of characteristic a source.
• Finally, we tend to additionally take into account the
choice of adding “fake” objects to the distributed set. Such
objects don't correspond to real entities however seem.
•Agent won't be able to send sensitive knowledge through e-
mail.The agent receives the Whole knowledge object that
satisfies the condition of the agents knowledge request. Just in
case of express knowledge request with pretend allowed, the
distributor cannot take away or alter the requests R from the
agent. But distributor will add The pretend object. The
optimal algorithmic rule minimizes each term of the target
summation by adding most range of faux objects to each set
yielding best answer.
• This approach saves the time as a result of we tend to area
unit progressing to implement this method solely within the
middle knowledge set.
4. MODULE DESCRIPTIONS
User Authentication:
In this module, user registration process is done by the
administrator. Here every user will give their details for
registration. User details are encrypted by using AES
(Advanced Encryption Standard) Algorithm. Authenticated
person only can register in this process. Administrator will
generate a username and password for every user. The user
can use that username and password for login process.
Fake Object Generation:
In this module, the owner of the data or information
will add some fake objects (record) in database which will
exactly look like original data. The client will be unaware of
these fake objects. Only the owner of the data knows where
and how many fake objects inserted into original data.
E-Random Implementation:
E-optimal solution
O (n+n2B) = O (n2B)
Where n= number of agents,
B= number of Fake objects.
S-Random Implementation:
In this module the a lot of knowledge objects the agents
request in total, the a lot of recipients on the average An object
has and also the a lot of objects area unit shared
among completely different agents, the harder
it's to discover a guilty agent. During this rule, the agent
receives solely the set of knowledge object which
will tend to the agent
Data Distributor:
A knowledge distributor has given sensitive data to a
group of purportedly sure agents (third parties). a number
of the information is leaked and located in associate
unauthorized place (e.g., on the online or somebody's laptop).
The distributor should assess the chance that the leaked
knowledge came from one or additional agents,
as against having been severally gathered by different means
that.
E-Mail Filtering:
This module involves 6 steps.
1. Identify the data.
2. Remove stopping words such as this, is, a, etc.
3. Remove or change the synonyms.
4. Calculate the priority of the word depending upon
the sensitivity of the data.
5. Compare data with predefine company datasets.
6. Filter the data if it has company's important data
sets.
Instant Mail Alert:
The owner of the organization will get the mail alert of the
data leaker (or) guilt agent.
Triple DES
In cryptography, Triple DES (3DES) is that the common
name for the Triple encoding algorithmic rule (TDEA or
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014)
49
Triple DEA) symmetric -key block
cipher, that applies information |the info| the
information} cryptography customary (DES)cipher algorithmi
c rule 3 times to every data block. The first DES cipher's key
size of fifty six bits was typically ample once that algorithmic
rule was designed, however the provision of
accelerating process power created brute-force attacks
possible. Triple DES provides a comparatively easy
technique of accelerating the key size of DES to guard against
such attacks, while not the requirement to style a totally new
block cipher algorithmic rule. In general, Triple DES
with 3freelance keys (keying choice 1) encompasses a key
length of 168 bits(three56-bitDES keys), however because
of the meet-in-the-middle attack, the effective security it
provides is just 112 bits. Keying choice a pair of reduces the
effective key size to 112 bits (because the third secret's a
similar because the first). However, this feature is vulnerable
to sure chosen plain text or better known plain text attacks,
and thus, it's selected by government agency to
own solely eighty bits of security.
5. SYSTEM ARCHITECTURE
ALGORITHM DETAILS
S-Random:
In s-random, we have a tendency to introduce vector that
shows the article sharing distribution. Specifically, shows
the amount of agents United Nations agency receive object
tk. algorithmic rule s-random allocates objects to agents in a
very round-robin fashion. When the formatting of vectors d
and a in lines one and a couple of of algorithmic
rule four, the most loop in lines is dead whereas
there are still knowledge objects to be allotted to agents. In
every iteration of this loop, the algorithmic rule uses perform
SELECT OBJECT () to search out a random object
to portion to agent Uri. This loop iterates over all
agents United Nations agency haven't received the amount of
knowledge objects they need requested. The period of
time of the algorithmic rule is and depends on the period of
time nine of the article choice perform SELECT OBJECT().
Just in case of random choice, we are able to have by
keeping in memory a group of sixty two Rig for every agent
Ui. Algorithmic rule s-random could yield a poor knowledge
allocation. Say, as an example, that the distributor set T
has 3 objects and there are 3agents United Nations agency
request one object every. It’s potential that s-random provides
all 3 agents with identical object. Such associate
degree allocation maximizes each objectives (9a) and (9b)
rather than minimizing them.
E-Random:
In issues of sophistication EF, the
distributor isn't allowed to feature pretend objects to the
distributed information. So, the information allocation is
totally outlined by the agents’ data requests.
Therefore, there's nothing to optimize. In EF issues, objective
values square measure initialized by
agents’ information requests. Say, for instance, the distributor
will add one pretend object to either R1 or R2 to extend the
corresponding divisor of the summation term. Assume that the
distributor creates a pretend object f and he provides it to
agent R1. formula one may be a general “driver” which
will be employed by alternative ways, whereas formula two
truly performs the random choice. we tend to denote the mix
of formula one with two as e-random. we tend to use e-
random as our baseline in our comparisons with
alternative algorithms for express information requests.
6. CONCLUSION
In this paper, we've projected AN approach that
identifies that a part of intermediate information sets must be
encrypted where as the remainder doesn't, so as to avoid
wasting the privacy conserving value. A tree structure has
been sculptured from the generation relationships of
intermediate in formation sets to the investigate Privacy
propagation among information sets. We have
cultured downside the matter of saving privacy
preserving value as a forced improvement problem that is
addressed by rotten the privacy run constraints. A sensible
heuristic algorithmic program has been designed
consequently. analysis results on real world information
sets and bigger intensive information sets with numerous
information and computation intensive applications on cloud,
intermediate information set management is changing into a
crucial analysis space. Privacy conserving for intermediate
information sets is one amongst necessary however difficult
analysis problems, and desires intensive investigation. With
the contributions of this paper, we tend to are reaching to any
investigate privacy aware economical programming of
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014)
50
intermediate information sets in cloud by taking
privacy conserving as a metric alongside different
metrics like s to rage and computation. Optimized balanced
programming ways are expected to be developed toward over
all extremely economical privacyware data is set for
programming.
REFERENCES
[1]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A.Konwinski,
G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of
Cloud Computing,” Comm. ACM, vol. 53,no. 4, pp. 50-58, 2010.
[2]. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud
Computing and Emerging It Platforms: Vision, Hype, and Reality for
Delivering Computing as the Fifth Utility,” Future Generation
Computer Systems, vol. 25, no. 6, pp. 599-616, 2009.
[3]. L. Wang, J. Zhan, W. Shi, and Y. Liang, “In Cloud, Can Scientific
Communities Benefit from the Economies of Scale?,” IEEE Trans.
Parallel and Distributed Systems, vol. 23, no. 2, pp. 296-303, Feb.
2012.
[4]. H. Takabi, J.B.D. Joshi, and G. Ahn, “Security and Privacy Challenges
in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8,
no. 6, pp. 24-31, Nov./Dec. 2010.
[5]. D. Zissis and D. Lekkas, “Addressing Cloud Computing Security
Issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583-
592, 2011.
[6]. D. Yuan, Y. Yang, X. Liu, and J. Chen, “On-Demand Minimum Cost
Benchmarking for Intermediate Data Set Storage in Scientific Cloud
Workflow Systems,” J. Parallel Distributed Computing, vol. 71, no. 2,
pp. 316-332, 2011.
[7]. S.Y. Ko, I. Hoque, B. Cho, and I. Gupta, “Making Cloud Intermediate
Data Fault-Tolerant,” Proc. First ACM Symp. Cloud Computing
(SoCC ’10), pp. 181-192, 2010.
[8]. H. Lin and W. Tzeng, “A Secure Erasure Code-Based Cloud Storage
System with Secure Data Forwarding,” IEEE Trans. Parallel and
Distributed Systems, vol. 23, no. 6, pp. 995-1003, June 2012.
[9]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc.
IEEE INFOCOM ’11, pp. 829-837, 2011.
[10]. M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private Keyword
Search over Encrypted Data in Cloud Computing,” Proc. 31st Int’l
Conf. Distributed Computing Systems (ICDCS ’11), pp. 383-392,
2011.
[11]. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,”
Proc. 41st Ann. ACM Symp. Theory of Computing (STOC ’09), pp.
169-178, 2009.
[12]. B.C.M. Fung, K. Wang, and P.S. Yu, “Anonymizing Classification
Data for Privacy Preservation,” IEEE Trans. Knowledge and Data
Eng., vol. 19, no. 5, pp. 711-725, May 2007.
[13]. B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, “Privacy-Preserving
Data Publishing: A Survey of Recent Developments,” ACM
Computing Survey, vol. 42, no. 4, pp. 1-53, 2010.
[14]. X. Zhang, C. Liu, J. Chen, and W. Dou, “An Upper-Bound Control
Approach for Cost-Effective Privacy Protection of Intermediate Data
Set Storage in Cloud,” Proc. Ninth IEEE Int’l Conf. Dependable,
Autonomic and Secure Computing (DASC ’11), pp. 518-525, 2011.
[15]. I. Roy, S.T.V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel,
“Airavat: Security and Privacy for Mapreduce,” Proc. Seventh
USENIX Conf. Networked Systems Design and Implementation (NSDI
’10), p. 20, 2010.
[16]. K.P.N. Puttaswamy, C. Kruegel, and B.Y. Zhao, “Silverline: Toward
Data Confidentiality in Storage-Intensive Cloud Applications,” Proc.
Second ACM Symp. Cloud Computing (SoCC ’11), 2011.
[17]. K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-
Aware Data Intensive Computing on Hybrid Clouds,”
Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp.
515-526, 2011.
[18]. V. Ciriani, S.D.C.D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi,
and P. Samarati, “Combining Fragmentation and Encryption to Protect
Privacy in Data Storage,” ACM Trans. Information and
System Security, vol. 13, no. 3, pp. 1-33, 2010.
[19]. S.B. Davidson, S. Khanna, T. Milo, D. Panigrahi, and S. Roy,
“Provenance Views for Module Privacy,” Proc. 30th ACM SIGMOD-
SIGACT-SIGARTSymp. Principles of Database Systems (PODS ’11),
pp. 175-186, 2011.
[20]. S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen, and Y.
Chen, “On Provenance and Privacy,” Proc. 14th Int’l Conf. Database
Theory, pp. 3-10, 2011.

More Related Content

What's hot

Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Chaitanya Kn
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method IJMER
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and ManagementIRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...drboon
 
Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...IAEME Publication
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET Journal
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - NuixNuix
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 

What's hot (20)

Bh32379384
Bh32379384Bh32379384
Bh32379384
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Classification with R
Classification with RClassification with R
Classification with R
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and Management
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...
A Development of a Reliable and Trusted Mobile RFID-based Asset Management Sy...
 
Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 

Viewers also liked

Info om powerpoint
Info om powerpointInfo om powerpoint
Info om powerpointmykle88
 
T21 ejemplosdatos illiaprostychenko
T21 ejemplosdatos illiaprostychenkoT21 ejemplosdatos illiaprostychenko
T21 ejemplosdatos illiaprostychenkoillia97
 
8 Steps To Irresistible Email Copy Every Time
8 Steps To Irresistible Email Copy Every Time8 Steps To Irresistible Email Copy Every Time
8 Steps To Irresistible Email Copy Every Timeffats1
 
Путевки в Тайланд горящие туры
Путевки в Тайланд горящие турыПутевки в Тайланд горящие туры
Путевки в Тайланд горящие турыPicky Trips
 
Michael odoul-spune-mi-unde-te-doare
Michael odoul-spune-mi-unde-te-doareMichael odoul-spune-mi-unde-te-doare
Michael odoul-spune-mi-unde-te-doareWu Dang
 
Mockingjay (1)
Mockingjay (1)Mockingjay (1)
Mockingjay (1)Librarian
 
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))fotisalexoglou
 
Tauhid sebagai Intisari Agama Islam
Tauhid sebagai Intisari Agama IslamTauhid sebagai Intisari Agama Islam
Tauhid sebagai Intisari Agama Islamwindashavira
 
Eclipse z.egshigt
Eclipse z.egshigtEclipse z.egshigt
Eclipse z.egshigtLibrarian
 
CV - Kamal Al-Sukhun new
CV - Kamal Al-Sukhun newCV - Kamal Al-Sukhun new
CV - Kamal Al-Sukhun newKamal Alsukhun
 
Training kunjungan/visitasi
Training kunjungan/visitasiTraining kunjungan/visitasi
Training kunjungan/visitasiNaomi Fortuna
 
Bbc itasca layman
Bbc itasca laymanBbc itasca layman
Bbc itasca laymanAnn Treacy
 
Primer on application_performance_testing_v0.2
Primer on application_performance_testing_v0.2Primer on application_performance_testing_v0.2
Primer on application_performance_testing_v0.2Trevor Warren
 
Jalan pejuang seorang guru
Jalan pejuang seorang guruJalan pejuang seorang guru
Jalan pejuang seorang guruTitin Supriatin
 

Viewers also liked (20)

Info om powerpoint
Info om powerpointInfo om powerpoint
Info om powerpoint
 
T21 ejemplosdatos illiaprostychenko
T21 ejemplosdatos illiaprostychenkoT21 ejemplosdatos illiaprostychenko
T21 ejemplosdatos illiaprostychenko
 
8 Steps To Irresistible Email Copy Every Time
8 Steps To Irresistible Email Copy Every Time8 Steps To Irresistible Email Copy Every Time
8 Steps To Irresistible Email Copy Every Time
 
Путевки в Тайланд горящие туры
Путевки в Тайланд горящие турыПутевки в Тайланд горящие туры
Путевки в Тайланд горящие туры
 
Vpt InBeeld vpt in ivp Leiden
Vpt InBeeld vpt in ivp LeidenVpt InBeeld vpt in ivp Leiden
Vpt InBeeld vpt in ivp Leiden
 
Alat optik
Alat optikAlat optik
Alat optik
 
лого
логолого
лого
 
Michael odoul-spune-mi-unde-te-doare
Michael odoul-spune-mi-unde-te-doareMichael odoul-spune-mi-unde-te-doare
Michael odoul-spune-mi-unde-te-doare
 
Mockingjay (1)
Mockingjay (1)Mockingjay (1)
Mockingjay (1)
 
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))
ΤΡΑΠΕΖΑ ΘΕΜΑΤΩΝ Β ΠΡΟΣΑΝΑΤΟΛΙΣΜΟΥ ΘΕΜΑ Δ (ΣΥΝΔΥΑΣΤΙΚΑ 1 ΚΑΙ 2 ΚΕΦΑΛΑΙΟΥ))
 
Tauhid sebagai Intisari Agama Islam
Tauhid sebagai Intisari Agama IslamTauhid sebagai Intisari Agama Islam
Tauhid sebagai Intisari Agama Islam
 
Eclipse z.egshigt
Eclipse z.egshigtEclipse z.egshigt
Eclipse z.egshigt
 
CV - Kamal Al-Sukhun new
CV - Kamal Al-Sukhun newCV - Kamal Al-Sukhun new
CV - Kamal Al-Sukhun new
 
T21 kiem tra chuong 2
T21 kiem tra chuong 2T21 kiem tra chuong 2
T21 kiem tra chuong 2
 
Training kunjungan/visitasi
Training kunjungan/visitasiTraining kunjungan/visitasi
Training kunjungan/visitasi
 
las redes sociales
las redes socialeslas redes sociales
las redes sociales
 
Membuat Yoghurt
Membuat YoghurtMembuat Yoghurt
Membuat Yoghurt
 
Bbc itasca layman
Bbc itasca laymanBbc itasca layman
Bbc itasca layman
 
Primer on application_performance_testing_v0.2
Primer on application_performance_testing_v0.2Primer on application_performance_testing_v0.2
Primer on application_performance_testing_v0.2
 
Jalan pejuang seorang guru
Jalan pejuang seorang guruJalan pejuang seorang guru
Jalan pejuang seorang guru
 

Similar to Privacy Preserving Based Cloud Storage System

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET Journal
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage DetectionAshwini Nerkar
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.Ashley Smith
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxshericehewat
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.pptnaresh2004s
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxPoojaG86
 

Similar to Privacy Preserving Based Cloud Storage System (20)

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
547 551
547 551547 551
547 551
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docx
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
 

More from Kumar Goud

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsKumar Goud
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingKumar Goud
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Kumar Goud
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Kumar Goud
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...Kumar Goud
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...Kumar Goud
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...Kumar Goud
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...Kumar Goud
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiaKumar Goud
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...Kumar Goud
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureKumar Goud
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...Kumar Goud
 

More from Kumar Goud (20)

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission lines
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in india
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Privacy Preserving Based Cloud Storage System

  • 1. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 47 Privacy Preserving Based Cloud Storage System V.Shravani T.V.Ramanamma M.Tech Scholar Sr.Asst.Professor Aurora's Technological & Research Institute Aurora's Technological & Research Institute Uppal, Hyderabad. Uppal, Hyderabad. Abstract: Cloud computing provides huge computation power and storage capability that alter users to deploy computation and data-intensive applications while not infrastructure investment. on the process of such applications, an oversized volume of intermediate knowledge sets are going to be generated, and sometimes hold on to avoid wasting the value of re computing them. However, protective the privacy of intermediate knowledge sets becomes a difficult drawback as a result of adversaries could recover privacy-sensitive data by analyzing multiple intermediate knowledge sets. Encrypting all knowledge sets in cloud is wide adopted in existing approaches to deal with this challenge.however we tend to argue that encrypting all intermediate knowledge sets square measure neither economical nor efficient as a result of it’s terribly time intense and dear for knowledge intensive applications to encrypt or decrypt data sets where as play acting any operation on them. During this paper, we tend to propose a complete unique bound privacy outflow constraint based approach to spot that intermediate knowledge sets ought to be encrypted and that don’t, so privacy preserving value may be saved where as the privacy needs of information holders will still be happy. Analysis results demonstrate that the privacy preserving value of intermediate knowledge sets may be considerably reduced with our approach over existing ones wherever all knowledge sets square measure encrypted. Keywords: - Cloud computing, data storage privacy, privacy preserving, intermediate data set, privacy upper bound 1. INTRODUCTION We think about applications wherever the first sensitive knowledge can't be is composed. Perturbation may be a terribly helpful technique wherever the information is changed and created "less sensitive" before being two-handed to agents. One will add random noise to bound attributes, or one will replace actual values by ranges. However, n some cases it's vital to not alter the first distributor's knowledge. For instance, if Associate in nursing outsourcer is doing our payroll, he should have the precise earnings and client checking account numbers. If medical researchers are going to be treating patients (as hostile merely computing statistics), they will would like correct knowledge for the patients. Historically, discharge detection is handled by watermarking. e.g., a singular code is embedded in every distributed copy. If that replicate is later discovered within the hands of Associate in nursing unauthorized party, the informant are often known. Watermarks are often terribly helpful in some cases, but again, involve some modification of the first knowledge. Moreover, watermarks will typically be destroyed if the information recipient is malicious. knowledge discharge are often detailed as in once a knowledge a knowledge an information} distributor has given sensitive data to a group of purportedly trustworthy agents and a few of the information is leaked and located in associate in nursing enterprise knowledge leak may be a shivery proposition. Security practitioners have continually had to trot out knowledge discharge problems that arise from numerous ways that like email, and different net channels. Justin case of knowledge discharge from trustworthy agents, the distributor should assess the chance that the leaked knowledge came from one or additional agents. This can be done by employing a system which may establish those parties World Health Organization area unit guilty for such discharge even once knowledge is altered. For this the system will use knowledge allocation are also can inject realistic however fake knowledge record to enhance identification of discharge. Moreover, knowledge also can be leaked from inside a corporation through mails. There's conjointly a requirement to filter these e-mails. This will be done by interference emails that contain pictures, videos or sensitive knowledge for a corporation. Principle utilized in e- mail filtering is we tend to classify e- mail primarily based the fingerprints of message bodies, the white and black lists of email addresses and also the words specific to spam. 2. PREVIOUS SYSTEM In Existing system, watermarking technique is employed to spot the guilty agents World Health Organization area unit unseaworthy the sensitive info or information. Watermarking is one in all previous techniques that contain a novel code. This distinctive code is embedded in every copy that is then distributed to the purchasers by the user. LIMITATIONS: However, in some cases it's vital to not alter the initial distributor’s information. Traditionally, cloud discharge detection is handled by watermarking, e.g., a novel code is embedded in every distributed copy. If that duplicate is later discovered within the hands of associate degree unauthorized party, the informant will be known. Water marks will be terribly helpful in some cases, but again, involve some modification of the initial information. Watermarks will generally be destroyed if the info recipient is malicious.
  • 2. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 48 3. PROPOSED SYSTEM The main aim of the projected system is to seek out out once and UN agency has leaked the sensitive information. Within the projected system; it's getting to implement the thought of "Fake Objects". currently if suppose the director of the corporate needs to share some sensitive information (records) with shoppers of his company however he doesn't wish his information to be leaked anyplace in between. There fore before causation the sensitive information to the shoppers what the projected system can do is it'll add faux objects (record) in information which can precisely appear as if original information. The shopper is going to be unaware of those faux objects. The system goes to use totally different modules for adding faux objects and or detection faux objects. Additionally implementation thought of email filtering module during which if agent tries to e-mail the sensitive information, the mail are going to be sent in Associate in Nursing secret writing format by exploitation cryptography. And also the information’s keep within the data set are going to be in encrypted format. If the agent tries to send the info to shopper suggests that the info are going to be send as encrypted data’s, At same time the owner of the organization additionally can get identical mail that the agent leaks. However agents don’t understand that, however the owner of the corporate will read the first information that is leaked. ADVANTAGES • We additionally gift algorithms for distributing objects to agents, in an exceedingly manner that improves our possibilities of characteristic a source. • Finally, we tend to additionally take into account the choice of adding “fake” objects to the distributed set. Such objects don't correspond to real entities however seem. •Agent won't be able to send sensitive knowledge through e- mail.The agent receives the Whole knowledge object that satisfies the condition of the agents knowledge request. Just in case of express knowledge request with pretend allowed, the distributor cannot take away or alter the requests R from the agent. But distributor will add The pretend object. The optimal algorithmic rule minimizes each term of the target summation by adding most range of faux objects to each set yielding best answer. • This approach saves the time as a result of we tend to area unit progressing to implement this method solely within the middle knowledge set. 4. MODULE DESCRIPTIONS User Authentication: In this module, user registration process is done by the administrator. Here every user will give their details for registration. User details are encrypted by using AES (Advanced Encryption Standard) Algorithm. Authenticated person only can register in this process. Administrator will generate a username and password for every user. The user can use that username and password for login process. Fake Object Generation: In this module, the owner of the data or information will add some fake objects (record) in database which will exactly look like original data. The client will be unaware of these fake objects. Only the owner of the data knows where and how many fake objects inserted into original data. E-Random Implementation: E-optimal solution O (n+n2B) = O (n2B) Where n= number of agents, B= number of Fake objects. S-Random Implementation: In this module the a lot of knowledge objects the agents request in total, the a lot of recipients on the average An object has and also the a lot of objects area unit shared among completely different agents, the harder it's to discover a guilty agent. During this rule, the agent receives solely the set of knowledge object which will tend to the agent Data Distributor: A knowledge distributor has given sensitive data to a group of purportedly sure agents (third parties). a number of the information is leaked and located in associate unauthorized place (e.g., on the online or somebody's laptop). The distributor should assess the chance that the leaked knowledge came from one or additional agents, as against having been severally gathered by different means that. E-Mail Filtering: This module involves 6 steps. 1. Identify the data. 2. Remove stopping words such as this, is, a, etc. 3. Remove or change the synonyms. 4. Calculate the priority of the word depending upon the sensitivity of the data. 5. Compare data with predefine company datasets. 6. Filter the data if it has company's important data sets. Instant Mail Alert: The owner of the organization will get the mail alert of the data leaker (or) guilt agent. Triple DES In cryptography, Triple DES (3DES) is that the common name for the Triple encoding algorithmic rule (TDEA or
  • 3. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 49 Triple DEA) symmetric -key block cipher, that applies information |the info| the information} cryptography customary (DES)cipher algorithmi c rule 3 times to every data block. The first DES cipher's key size of fifty six bits was typically ample once that algorithmic rule was designed, however the provision of accelerating process power created brute-force attacks possible. Triple DES provides a comparatively easy technique of accelerating the key size of DES to guard against such attacks, while not the requirement to style a totally new block cipher algorithmic rule. In general, Triple DES with 3freelance keys (keying choice 1) encompasses a key length of 168 bits(three56-bitDES keys), however because of the meet-in-the-middle attack, the effective security it provides is just 112 bits. Keying choice a pair of reduces the effective key size to 112 bits (because the third secret's a similar because the first). However, this feature is vulnerable to sure chosen plain text or better known plain text attacks, and thus, it's selected by government agency to own solely eighty bits of security. 5. SYSTEM ARCHITECTURE ALGORITHM DETAILS S-Random: In s-random, we have a tendency to introduce vector that shows the article sharing distribution. Specifically, shows the amount of agents United Nations agency receive object tk. algorithmic rule s-random allocates objects to agents in a very round-robin fashion. When the formatting of vectors d and a in lines one and a couple of of algorithmic rule four, the most loop in lines is dead whereas there are still knowledge objects to be allotted to agents. In every iteration of this loop, the algorithmic rule uses perform SELECT OBJECT () to search out a random object to portion to agent Uri. This loop iterates over all agents United Nations agency haven't received the amount of knowledge objects they need requested. The period of time of the algorithmic rule is and depends on the period of time nine of the article choice perform SELECT OBJECT(). Just in case of random choice, we are able to have by keeping in memory a group of sixty two Rig for every agent Ui. Algorithmic rule s-random could yield a poor knowledge allocation. Say, as an example, that the distributor set T has 3 objects and there are 3agents United Nations agency request one object every. It’s potential that s-random provides all 3 agents with identical object. Such associate degree allocation maximizes each objectives (9a) and (9b) rather than minimizing them. E-Random: In issues of sophistication EF, the distributor isn't allowed to feature pretend objects to the distributed information. So, the information allocation is totally outlined by the agents’ data requests. Therefore, there's nothing to optimize. In EF issues, objective values square measure initialized by agents’ information requests. Say, for instance, the distributor will add one pretend object to either R1 or R2 to extend the corresponding divisor of the summation term. Assume that the distributor creates a pretend object f and he provides it to agent R1. formula one may be a general “driver” which will be employed by alternative ways, whereas formula two truly performs the random choice. we tend to denote the mix of formula one with two as e-random. we tend to use e- random as our baseline in our comparisons with alternative algorithms for express information requests. 6. CONCLUSION In this paper, we've projected AN approach that identifies that a part of intermediate information sets must be encrypted where as the remainder doesn't, so as to avoid wasting the privacy conserving value. A tree structure has been sculptured from the generation relationships of intermediate in formation sets to the investigate Privacy propagation among information sets. We have cultured downside the matter of saving privacy preserving value as a forced improvement problem that is addressed by rotten the privacy run constraints. A sensible heuristic algorithmic program has been designed consequently. analysis results on real world information sets and bigger intensive information sets with numerous information and computation intensive applications on cloud, intermediate information set management is changing into a crucial analysis space. Privacy conserving for intermediate information sets is one amongst necessary however difficult analysis problems, and desires intensive investigation. With the contributions of this paper, we tend to are reaching to any investigate privacy aware economical programming of
  • 4. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 50 intermediate information sets in cloud by taking privacy conserving as a metric alongside different metrics like s to rage and computation. Optimized balanced programming ways are expected to be developed toward over all extremely economical privacyware data is set for programming. REFERENCES [1]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53,no. 4, pp. 50-58, 2010. [2]. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009. [3]. L. Wang, J. Zhan, W. Shi, and Y. Liang, “In Cloud, Can Scientific Communities Benefit from the Economies of Scale?,” IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 2, pp. 296-303, Feb. 2012. [4]. H. Takabi, J.B.D. Joshi, and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010. [5]. D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583- 592, 2011. [6]. D. Yuan, Y. Yang, X. Liu, and J. Chen, “On-Demand Minimum Cost Benchmarking for Intermediate Data Set Storage in Scientific Cloud Workflow Systems,” J. Parallel Distributed Computing, vol. 71, no. 2, pp. 316-332, 2011. [7]. S.Y. Ko, I. Hoque, B. Cho, and I. Gupta, “Making Cloud Intermediate Data Fault-Tolerant,” Proc. First ACM Symp. Cloud Computing (SoCC ’10), pp. 181-192, 2010. [8]. H. Lin and W. Tzeng, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding,” IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 995-1003, June 2012. [9]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM ’11, pp. 829-837, 2011. [10]. M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,” Proc. 31st Int’l Conf. Distributed Computing Systems (ICDCS ’11), pp. 383-392, 2011. [11]. C. Gentry, “Fully Homomorphic Encryption Using Ideal Lattices,” Proc. 41st Ann. ACM Symp. Theory of Computing (STOC ’09), pp. 169-178, 2009. [12]. B.C.M. Fung, K. Wang, and P.S. Yu, “Anonymizing Classification Data for Privacy Preservation,” IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007. [13]. B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, “Privacy-Preserving Data Publishing: A Survey of Recent Developments,” ACM Computing Survey, vol. 42, no. 4, pp. 1-53, 2010. [14]. X. Zhang, C. Liu, J. Chen, and W. Dou, “An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Data Set Storage in Cloud,” Proc. Ninth IEEE Int’l Conf. Dependable, Autonomic and Secure Computing (DASC ’11), pp. 518-525, 2011. [15]. I. Roy, S.T.V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, “Airavat: Security and Privacy for Mapreduce,” Proc. Seventh USENIX Conf. Networked Systems Design and Implementation (NSDI ’10), p. 20, 2010. [16]. K.P.N. Puttaswamy, C. Kruegel, and B.Y. Zhao, “Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications,” Proc. Second ACM Symp. Cloud Computing (SoCC ’11), 2011. [17]. K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy- Aware Data Intensive Computing on Hybrid Clouds,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 515-526, 2011. [18]. V. Ciriani, S.D.C.D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Trans. Information and System Security, vol. 13, no. 3, pp. 1-33, 2010. [19]. S.B. Davidson, S. Khanna, T. Milo, D. Panigrahi, and S. Roy, “Provenance Views for Module Privacy,” Proc. 30th ACM SIGMOD- SIGACT-SIGARTSymp. Principles of Database Systems (PODS ’11), pp. 175-186, 2011. [20]. S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen, and Y. Chen, “On Provenance and Privacy,” Proc. 14th Int’l Conf. Database Theory, pp. 3-10, 2011.