Privacy Aware Efficient Data Scheduling of Intermediate Data Sets in Cloud

Provided by: IJAEGT
Topic: Cloud
Format: PDF
Cloud computing is an emerging field in the development of business and organizational environment. Now-a-days many organizations are very much interested to store their important and large amount of data into cloud in a secure manner and obtain data from it when in need. Encryption and decryption techniques are used to preserve the intermediate data sets in cloud. An upper bound constraint based approach is used to identify sensitive intermediate data sets and non-sensitive intermediate data sets. In order to reduce the time and cost the authors apply suppression technique on sensitive data sets. This is done in two ways namely full suppression and semi suppression.

Find By Topic