Académique Documents
Professionnel Documents
Culture Documents
Radha Krishna
1CS07IT011
Guided By- Anjan Kumar
Introduction
• What is Cloud Computing?
• Advantages of Cloud computing.
• Advantages of Privacy preservation using data perturbation method over other cryptographic
methods.
µx = µy and ∑x = ∑y
Perturbation Algorithm:
INPUT : X,S(Confidential and non-confidential data)
Output :Y( Perturbed data)
Generate noise € by using the random generator
µx = µy and ∑x = ∑y
Add the noise € to the input matrix X such that,
Y <- X + €
Outsource the data Y to the cloud.
• How privacy of the data owner’s data is preserved using RGADP method.
• Comparision of RGADP with other methods like GADP and EGADP.
• Proposed a method to affectively preserve data of the data owner from cloud service
provider.
• Main advantage is that the data can be retrieved back faster as compared to other methods.
• Few shortcomings:
The datasets should be order sensitive.
Large number of keys are used, hence key management should be affective.