期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2014
卷号:18
期号:2
页码:65-68
出版社:Seventh Sense Research Group
摘要:Cloud computing provides considerable storage capacity to the users to deploy their applications without any modification its infrastructure details. Along with that all applications we have a large set of intermediate datasets it can generated by the implanted changes in the cloud computing and it is a challenging problem to provide the privacy to these intermediate datasets in the network. After the encryption of all the data sets in the cloud computing it will generate the approaches for the further implementation. But we proposed that, encrypting all intermediate datasets are either cost effective nor efficient because it is a time consuming process for data intensive applications to encrypt and decrypt data repeatedly while performing any operation on data. Here we are propose a upper bound constraints of privacy leakage process based approach to identify or to find the intermediate datasets need to be encrypted and which intermediate datasets.