Author : B. Shamreen Ahamed 1
Date of Publication :7th October 2016
Abstract: Cloud computing offers a platform to client where the information to be accessed can be interchanged between the client and the server. The data being given to a third party server involves security risks as clients with weak computational power cannot verify the accuracy of the data that are gathered. This paper, aims at the periodic item sets, in which the server is not trusted and outbreaks the authentication practice by testing its existing ability of the deployed content. It involves different methods that can be used to improve the risk management. The probabilistic access verifies integrity of the data that is mined. The deterministic access verifies definiteness of the data gathered and stored. The major purpose of this project is to ensure the exactness of the outsourced recurrent item set mining as a paradigm of service. The information of a specific item is warehoused in local mining and third party mining. This accuracy of the information is verified by comparing the result of the local mining and the third party mining. If the information is not same, then it is considered that the information is modified. To avoid this conflict, the forms that are being sent to third party for acquiring the results, should be changed. This will ensure that the third party results are not manipulated.
Reference :