Visible to the public "Securing the Clustered Database Using Data Modification Technique"Conflict Detection Enabled

Title"Securing the Clustered Database Using Data Modification Technique"
Publication TypeConference Paper
Year of Publication2015
AuthorsP. Jain, S. Nandanwar
Conference Name2015 International Conference on Computational Intelligence and Communication Networks (CICN)
Date PublishedDec
PublisherIEEE
ISBN Number978-1-5090-0076-0
Accession Number16248143
Keywordsclustering, Computer science, data mining, data modification, data privacy, data protection, database clustering, distributed clustered database environments, Distributed Database, Distributed databases, information protection, Iris, online media, pattern clustering, Privacy preserving protocols, pubcrawl, pubcrawl170105, security, security of data, Standards, weka tool
Abstract

The new era of information communication and technology (ICT), everyone wants to store/share their Data or information in online media, like in cloud database, mobile database, grid database, drives etc. When the data is stored in online media the main problem is arises related to data is privacy because different types of hacker, attacker or crackers wants to disclose their private information as publically. Security is a continuous process of protecting the data or information from attacks. For securing that information from those kinds of unauthorized people we proposed and implement of one the technique based on the data modification concept with taking the iris database on weka tool. And this paper provides the high privacy in distributed clustered database environments.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7546279&isnumber=7546033&tag=1
DOI10.1109/CICN.2015.331
Citation Key7546279