IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 4, April 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Data Swapping In Cloud Computing

[Full Text]

 

AUTHOR(S)

Sachida Nanda Barik

 

KEYWORDS

 

ABSTRACT

ABSTRACT: In the modern era of fast computing data storage and data retrieval is occurred due to cloud computing. Cloud computing is a pool of computing resources available on demand with the use of internet. it is a term used for the consumption of utility computing resources. it is used to maximize the effectiveness of the shared resources which is currently available on cloud. it relaxes the companies from investing money on heavy infrastructure rather they can used the same resources on shared basis..in the wide use of cloud computing threat comes to storage of data in the cloud server as it not known to the cloud user where there data will be stored they usually reluctant to store their data on cloud. to gain their trust cloud providers are facilitating various user confidentiality methods to stored their data..one technology is being used is data swapping. it is a strategy for protecting the micro data confidentially which is yet to be released. the purpose of data swapping is to create uncertainty in the minds of the intruder. it is a method to adjust the data values by swapping fraction of records between the records so that the intruder won't get the actual data rather gets scrambled data.

 

REFERENCES

[1] Jensen, Meiko, et al. "On technical security issues in cloud computing." Cloud Computing, 2009. CLOUD'09. IEEE International Conference on. IEEE, 2009.

[2] Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." National Institute of Standards and Technology 53.6 (2009): 50.

[3] Shlomo, Natalie, Caroline Tudor, and Paul Groom. "Data swapping for protecting census tables." Privacy in statistical databases. Springer Berlin Heidelberg, 2010.

[4] Gomatam, Shanti, Alan F. Karr, and Ashish P. Sanil. "Data swapping as a decision problem." JOURNAL OF OFFICIAL STATISTICS-STOCKHOLM- 21.4 (2005): 635.

[5] Skinner, Chris J., and M. J. Elliot. "A measure of disclosure risk for microdata." Journal of the Royal Statistical Society: series B (statistical methodology) 64.4 (2002): 855-867.

[6] Moore Jr, Richard A. "BUREAU OF THE CENSUS STA-TISTICAL RESEARCH DIVISION."

[7] Wang, Jian, et al. "Providing privacy preserving in cloud computing." Test and Measurement, 2009. ICTM'09. International Conference on. Vol. 2. IEEE, 2009.

[8] Swapping, Categorical Data. "NISS." (2003).

[9] Krenzke, Tom, et al. "Data Coarsening and Data Swap-ping Algorithms."

[10] Reiss, Steven P. "Data-swapping--A technique for disclosure control." J. Statistical Planning and Inference 6.1 (1982): 73-85.

[11] Fienberg, Stephen E., and Julie McIntyre. "Data swapping: Variations on a theme by dalenius and reiss." Privacy in statistical databases. Springer Berlin Heidelberg, 2004.

[12] Datta, Souptik. On random additive perturbation for privacy preserving data mining. Diss. University of Maryland, 2004.

[13] Carlson, Michael, and Mickael Salabasis. "A data-swapping technique using ranks—a method for dis-closure control." Research in Official Statistics 6.2 (2002): 35-64.