Volume 9, Issue 4, April 2017

 

 

Secure Data Storage Over Cloud Using Content Features Processing
 

Secure Data Storage Over Cloud Using Content Features Processing

Pages: 59-66 (8) | [Full Text] PDF (721 KB)
SSA AHMED
Alamuri Ratnamala Inistyte of Engineering and Technology

Abstract -
With the advent growth of sensitive information on cloud ,Cloud security is getting more important than even before. Cloud computing is a type of computing that relies on sharing computing resources rather than having local server, or personal devices to handle applications. The cloud computing aim to providing IT as a service to the cloud user on demand basis with greater flexibility, availability, reliability, and scalability with utility computing model. Millions of users ,use a cloud computing for various purpose, therefore security and data protection on the cloud is a major concern. The future of cloud is to expand the use of application, and providing more privacy and authentication .We proposed a secure data model, where the information/data was encrypted/decrypted using asymmetric key mechanism, thus ensuring data confidentiality and security .The AES(Advance Encryption/ Decryption Standard)were used before data uploaded on the cloud ,after that only precision and privacy we used in LHS, Index Construction ,and Ranking .In this project, for the first time ,we defined and solved the challenging problem of secure data storage over cloud using content features processing .The search of a multi keywords performed on the real time data set, data owner was selected the group of data or category from the data set that can be ie education, technology, enter terminate ,politicians ,sports etc . Search was through keywords having customized algorithm contains the LHS(sensitive hashing),index construction, ranking for result based on high frequency TFidf tags were used to make the execution successful. To improve more searching and security on the data we further extend these two scheme to support more search and secure semantics.
 
Index Terms - Virtual Private Cloud, Multi Key Word Search, Real World Data Set, Searchable Encryption, Indexing Construction, Ranking Search

Citation - SSA AHMED. "Secure Data Storage Over Cloud Using Content Features Processing." International Journal of Computer Engineering and Information Technology 9, no. 4 (2017): 59-66.

Digital Rights Management by Using Cloud Computing
 

Digital Rights Management by Using Cloud Computing

Pages: 67-71 (5) | [Full Text] PDF (390 KB)
KS Ugale, Ankit Mune, HR Deshmukh
Department of Computer Technology, Sant Gadge Baba Amravati University, India

Abstract -
Cloud computing is an emerging technology which provides various services and storage for a large amount of digital data. The sharing and use of digital information is tremendously increasing in the world. Most of the information is stored in cloud as it provides storage as a service for huge data owners to store their data. This copyrighted data can be easily copied and can Distributed. Thus the security of this digital content is very important. For protecting the digital data the concept of Digital Rights Management was introduced. In DRM environment, only legitimate users are allow to access and use the copyrighted content. It is also equally important to preserve the privacy of the users who is accessing this digital content. For preserving the digital right of the data and privacy of the user various schemes have been proposed some of them rely on a Trusted Third Party (TTP) but there is possibility that the TTP become malicious. We are using an enhance scheme which can preserve both privacy of the user and digital rights of the content without relying on a TTP.
 
Index Terms - Cloud Computing, Trusted Third Party, Digital Rights Management

Citation - KS Ugale, Ankit Mune, HR Deshmukh. "Digital Rights Management by Using Cloud Computing." International Journal of Computer Engineering and Information Technology 9, no. 4 (2017): 67-71.

Comparative Analysis of Sequential Pattern Mining and High Utility Pattern Mining
 

Comparative Analysis of Sequential Pattern Mining and High Utility Pattern Mining

Pages: 72-75 (4) | [Full Text] PDF (194 KB)
AA Bhosale
Computer Sci. and Engg. Dept. TKIET, Warananagar, India

Abstract -
Mining high utility itemsets is an important research area in data mining. In this mining area, sequential pattern mining and high utility pattern mining plays an important role. Sequential pattern mining concerned with mining statistically relevant patterns where, data are delivered in a sequence and high utility pattern mining concerned finding itemsets with a high utility like the profit from the database. Different algorithms have been work on these areas, but some of them have a problem of generating a large number of irrelevant patterns. Due to this performance of mining is reduced in the case of execution time and gives a less accurate result. Therefore instead of applying single mining techniques, if both sequential and high utility mining user will get more efficient and useful patterns. In this paper, I have analyzed working of sequential and High utility mining technique..
 
Index Terms - Data Mining, High Utility Mining, Sequential Pattern Mining

Citation - AA Bhosale. "Comparative Analysis of Sequential Pattern Mining and High Utility Pattern Mining." International Journal of Computer Engineering and Information Technology 9, no. 4 (2017): 72-75.