Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3
Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3
Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3
Health Record Management System – A Web-based Application
Volume-3 | Issue-4
A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3
IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2
Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Volume-3 | Issue-3
Review of Internet of Wearable Things and Healthcare based Computational Devices
Volume-3 | Issue-3
Stock Index Prediction with Financial News Sentiments and Technical Indicators
Volume-4 | Issue-3
Hybrid Framework on Automatic Detection and Recognition of Traffic Display board Signs
Volume-3 | Issue-3
Suspicious Human Activity Detection System
Volume-2 | Issue-4
ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3
EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2
Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4
IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2
Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3
A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3
IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1
Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3
Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4
Volume - 4 | Issue - 2 | june 2022
Published
13 July, 2022
Cloud computing allows customers to run compute and data-intensive applications without the need for a large investment in infrastructure. Additionally, a significant amount of intermediate datasets are created and often saved, in order to reduce the expense of re-computing these applications. It becomes difficult to protect the privacy of intermediate datasets because attackers may be able to retrieve information that is sensitive to privacy via the analysis of several intermediate datasets. Existing techniques to deal with this problem generally endorse the use of encryption for all cloud datasets. For data-intensive applications, the time and expense of repeatedly decrypting and encrypting intermediate datasets are prohibitive; hence, encrypting all intermediate datasets does not make sense. Big heterogeneous data storage concerns and challenges, countermeasures (security and administration) and cloud storage prospects, are discussed in this article. New questions arise for cloud storage researchers, when they examine these issues in depth.
KeywordsPrivacy in cloud cloud storage authentication data security data protection homomorphic encryption
Full Article PDF