Professional Documents
Culture Documents
1.
INTRODUCTION
101
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
2.
102
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
2.1.2 Authentication
After authentication procedure done
successfully, client C confirm recovers
the valuable data that have been
distributed between a pair of the two
parties (e.g., client C and secondary
server B). Upon verification of data,
client server C will receive a new
encrypted data (i.e.: the secret data
validation and sharing encrypted). Data
recovery key can be used to encrypt /
decrypt the bulk data storage where
data that has been encrypted placed in
storage cloud
103
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
3.
CRYPTHOGRAPHY
PROVISION STORAGE
3.1 Accessibility
4. DATA OPTIMIZATION
104
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
Query-execution
engine takes an optimal evaluation
plan, execute and return the
answers query by system
a. Data Storage
B. Cloud Storage
Processing
System
Query
105
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
data
Expression 1_ENAME
(_DUR>37EMP.ENO=ASG.ENO
(EMP ASG))
Expression 2: _ENAME (EMP
ENO (_DUR>37(ASG)))
5.
PROPOSED DESIGN
106
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
Youth
107
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
politics.
economy
and
National Registration
Department
Accountant General Department
Social Welfare Department
108
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
6.Conclusion
It is an expectation that this study can
serve as a basis and guide (baseline) in
addition to the public sector in the
implementation of programs related to
ICT technology to guarantee security
foundations of secrecy (confidentiality),
integrity (integrity) and accessibility
(accessibility) are complied with at all
times.
The overall view of the original system
has improved in availability readily as the
modularity concept was applied where
the number of single point of failure is
reduced through redundant components.
Further adding the resource monitor adds
robustness in high availability delivery as
well as ensuring service continuity with
fault tolerance and fast recovery.
The proposed framework uses an
adaptive fault tolerance technique to
achieve high availability with neighbor
replication and master-slave database
replication. This technique is very
benecial in monitoring resource inside a
dynamic distributed environment with a
moderate number of nodes to increase the
overall availability and performance of
the system
Besides, through this study is expected to
be a strong consideration to be given the
utmost attention to security aspects before
a decision is made on technology
adaptation. This is because government
data and information is an important asset
of the State that is priceless.
In addition, the use of existing data
analyzed from time to time allow the
government and the administration to
109
Proceedings of The Third International Conference on Data Mining, Internet Computing, and Big Data, Konya, Turkey 2016
REFRENCES
[1] S. Subashini & V. Kavitha. (2011). A survey
on security issues in service delivery models
of cloud computing, Journal of Network and
Computer Applications, 34, 1-11.
[2] N.Samatha, K.Vijay Chandu, P.Raja Sekhar
Reddy (2012) Query Optimization Issues for
Data Retrieval in Cloud Computing. CSE,
Anurag Group of Institutions, Hyderabad,
A.P, India. CSE, Viswa Bharathi Group of
Institutions, Hyderabad, A.P, India
[10]
110