Secure and Efficient Group Based Data Retrieval from Cloud Storage Using Obfuscation and Data Mining Techniques

被引:0
|
作者
Suthar, Krunal [1 ]
Patel, Hiral [1 ]
机构
[1] Sankalchand Patel Coll Engn, Dept Comp Engn, Visnagar, Gujarat, India
来源
2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP) | 2017年
关键词
Cloud Computing; Obfuscation; Data mining; Data Retrieval;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In current era of Computer world everyone wants a quick access of data from anywhere and on anytime. Cloud computing provides lots of benefits to user at cheaper cost and whenever required. On one side thousand number of users information become available on central premises and able to achieve location independency where as on other side this generate issues related to data security as well as quick retrieval of information by analyzing user documents. These issues are not directly under the control of user. If we don't take proper care while retrieving of relevant information from the document of thousands of users then it becomes very tedious process. It is also crucial to secure user information on cloud storage from unauthorized access. When user needs to search something, it will be searched in every available document which takes large amount of time making user job wearisome. Hence to accost revealed important issues, here we proposed an efficient secure searching mechanism in which user can get require details quickly without getting any type of burden. Our proposed scheme deals with efficient searching and securing user information in Cloud environment which increase trust level as well as adoption of Cloud
引用
收藏
页数:7
相关论文
共 50 条
  • [21] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [22] Diabetes Estimation Through Data Mining Using Optimization, Clustering, and Secure Cloud Storage Strategies
    Shyam S. Gupta
    Tushar Kumar Pandey
    Vadali Pitchi Raju
    Rajeev Shrivastava
    Rajeev Pandey
    Ankita Nigam
    Vandana Roy
    SN Computer Science, 5 (6)
  • [23] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [24] Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation
    Chaudhari, Smita
    Swain, Gandharba
    IEEE ACCESS, 2022, 10 : 31607 - 31625
  • [25] DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques
    Borisenko, Konstantin
    Smirnov, Andrey
    Novikova, Evgenia
    Shorov, Andrey
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2016, 9728 : 197 - 211
  • [26] Using data mining techniques to improve replica management in cloud environment
    N. Mansouri
    M. M. Javidi
    B. Mohammad Hasani Zade
    Soft Computing, 2020, 24 : 7335 - 7360
  • [27] Using data mining techniques to improve replica management in cloud environment
    Mansouri, N.
    Javidi, M. M.
    Zade, B. Mohammad Hasani
    SOFT COMPUTING, 2020, 24 (10) : 7335 - 7360
  • [28] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [29] An Efficient Secure Distributed Cloud Storage for Append-only Data
    Sengupta, Binanda
    Nikam, Nishant
    Ruj, Sushmita
    Narayanamurthy, Srinivasan
    Nandi, Siddhartha
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 146 - 153
  • [30] EDSRPPC: An Efficient Data Storage and Retrieval through Personalization and Prediction in Cloud
    Varalakshmi, P.
    Thangavel, M.
    Nithya, K.
    Priya, T.
    Sakthya, D.
    2013 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2013, : 413 - 418