📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 9, ISSUE 12, DECEMBER 2020

Improve Privacy Preservation Security Model Victimization Totally Different Cluster Algorithmic Rule In Multi Cloud Design

B.Karthikaa, R. Pragaladan

DOI: 10.17148/IJARCCE.2020.91203

Abstract: Cloud computing is advanced technology, provides a road map to access the applications over the net. Cloud client and information owner customise applications through web. Because of storing Brobdingnagian quantity of knowledge on cloud, there could also be several problems associated with the protection in cloud network. To describes a privacy conserving cluster ways, homomorphic cryptography schemes which will run on a typical high performance computation platform, like a cloud system. In existing system offers a privacy conserving distance matrix calculation for many cluster algorithms. The privacy model is to applying part homomorphic cryptography ways to make a probabilistic classifier victimisation the acute learning machine rule and created the privacy-protected version of the ELM rule, that constructs a classification model by making an equation. In proposed model could be a privacy-preserving methodology victimisation the Paillier cryptography system for outsourced sensitive datasets. The consumer builds a final cluster model with aggregation of every encrypted distance matrix calculated at each party. Additionally work, so as to forestall information speech act from the model, the model itself ought to even be encrypted victimisation homomorphic cryptography algorithms. To permit the consumer to use the encrypted cluster model, new K-HUB cluster models square measure developed.

Keywords: Clustering; Homomorphic cryptography; Machine learning; Paillier encryption.

How to Cite:

[1] B.Karthikaa, R. Pragaladan, “Improve Privacy Preservation Security Model Victimization Totally Different Cluster Algorithmic Rule In Multi Cloud Design,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2020.91203