The rapid growth in the database data led to create of a large amount of data and the problem to access this data for answering user queries becomes more challenges.This work is concerned with problem of data retrieving from big encrypted database by proposing an approach consists(datamanagement, Encryption, DNA computing and Retrieval). The ICM algorithm and the three proposed clustering algorithm can be applied for big databases in both status (plain and encrypted) form.The second stage presents amodified CAST encryption algorithm to encrypt the database files (original or summarized).The S-Box that is used in the modified CAST algorithm is constructed by using an intelligent technique (DNA computing).Also, modified keys were used; the keys are generated by using AES generator with simple modification. After encryption process, the clusters can be built dynamicallyaccording to the user query byapplying suggested dynamic clustering algorithm which is used for both plain and encrypted data; this process provides time for the retrieval process because the files that are resulted from applying dynamic clustering algorithm include only relevant data to the user query.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The rapid growth in the database data led to create of a large amount of data and the problem to access this data for answering user queries becomes more challenges.This work is concerned with problem of data retrieving from big encrypted database by proposing an approach consists(datamanagement, Encryption, DNA computing and Retrieval). The ICM algorithm and the three proposed clustering algorithm can be applied for big databases in both status (plain and encrypted) form.The second stage presents amodified CAST encryption algorithm to encrypt the database files (original or summarized).The S-Box that is used in the modified CAST algorithm is constructed by using an intelligent technique (DNA computing).Also, modified keys were used; the keys are generated by using AES generator with simple modification. After encryption process, the clusters can be built dynamicallyaccording to the user query byapplying suggested dynamic clustering algorithm which is used for both plain and encrypted data; this process provides time for the retrieval process because the files that are resulted from applying dynamic clustering algorithm include only relevant data to the user query. 176 pp. Englisch. N° de réf. du vendeur 9786137332931
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Ali Rasha SubhiRasha Subhi Ali is Doctor in computer science in University of Technology.Prof. Dr. Ghassan Hameed Abdul Majeed is Doctor in Petroleum Engineering in Ministry of Higher Education.Assist. Prof.Dr.Alaa Kadhim Farhan is D. N° de réf. du vendeur 385844938
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -The rapid growth in the database data led to create of a large amount of data and the problem to access this data for answering user queries becomes more challenges.This work is concerned with problem of data retrieving from big encrypted database by proposing an approach consists(datamanagement, Encryption, DNA computing and Retrieval). The ICM algorithm and the three proposed clustering algorithm can be applied for big databases in both status (plain and encrypted) form.The second stage presents amodified CAST encryption algorithm to encrypt the database files (original or summarized).The S-Box that is used in the modified CAST algorithm is constructed by using an intelligent technique (DNA computing).Also, modified keys were used; the keys are generated by using AES generator with simple modification. After encryption process, the clusters can be built dynamicallyaccording to the user query byapplying suggested dynamic clustering algorithm which is used for both plain and encrypted data; this process provides time for the retrieval process because the files that are resulted from applying dynamic clustering algorithm include only relevant data to the user query.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 176 pp. Englisch. N° de réf. du vendeur 9786137332931
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Time Optimization of Encrypted QueryRetrieval for Intelligent Big Data | Rasha Subhi Ali (u. a.) | Taschenbuch | 176 S. | Englisch | 2018 | LAP LAMBERT Academic Publishing | EAN 9786137332931 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. N° de réf. du vendeur 111512745
Quantité disponible : 5 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 176 pages. 8.66x5.91x0.40 inches. In Stock. N° de réf. du vendeur zk6137332934
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The rapid growth in the database data led to create of a large amount of data and the problem to access this data for answering user queries becomes more challenges.This work is concerned with problem of data retrieving from big encrypted database by proposing an approach consists(datamanagement, Encryption, DNA computing and Retrieval). The ICM algorithm and the three proposed clustering algorithm can be applied for big databases in both status (plain and encrypted) form.The second stage presents amodified CAST encryption algorithm to encrypt the database files (original or summarized).The S-Box that is used in the modified CAST algorithm is constructed by using an intelligent technique (DNA computing).Also, modified keys were used; the keys are generated by using AES generator with simple modification. After encryption process, the clusters can be built dynamicallyaccording to the user query byapplying suggested dynamic clustering algorithm which is used for both plain and encrypted data; this process provides time for the retrieval process because the files that are resulted from applying dynamic clustering algorithm include only relevant data to the user query. N° de réf. du vendeur 9786137332931
Quantité disponible : 1 disponible(s)