Loading

Redistributed Records Collections Personality Matching using Encrypted Cryptosystem
R. Velvizhi1, C. Rajabhushanam2, S.R. Sri Vidhya3

1R. Velvizhi, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

2C. Rajabhushanam, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

3S.R. Sri Vidhya, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

Manuscript received on 15 October 2019 | Revised Manuscript received on 29 October 2019 | Manuscript Published on 26 December 2019 | PP: 1234-1236 | Volume-8 Issue-12S October 2019 | Retrieval Number: K133210812S19/2019©BEIESP | DOI: 10.35940/ijitee.K1332.10812S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Sensitive information is gradually distributed in the cloud in this project’s cloud computing and processing services to reduce costs, which raises concerns regarding data privacy. Encryption was a positive way to keep outsourced sensitive data secure, but it makes efficient use of data a very difficult process. In this paper, we focus on the issue of private matching in ide ntity-based cryptosystem over outsourced encrypted data sets that can simplify the management of certificates. To solve this proble m, we are proposing a private matching scheme based on identity.

Keywords: Cloud Computing, Data Mining, Data Sharing, Cloud Service Provider.
Scope of the Article: Data Mining