SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
73
Optimizing Data Confidentiality using
Integrated Multi Query Services
J.Srilatha1
S.Kerthy2
1
Anna University, Department of CSE, 2
Anna University, Department of CSE,
latha2k@yahoo.co.in skerthy_it@yahoo.com
Abstract — Query services have experienced terribly massive growth within past few years for that reason large usage
of services need to balance outsourcing data management to Cloud service providers that provide query services to the
client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed
attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be
compromise the query processed performance. It is not significant to provide slow query services as the result of security
along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with
kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-
Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query
processing performance that also increases the user experience.
Index Terms — Confidentiality, FSR-Tree, Minimum bounding Region, Range query, Query privacy.
——————————  ——————————
1 INTRODUCTION
Due to the plenty of users query services has shifted to the Cloud for
their non-interrupted accessibility to reduce the infrastructure cost.
With these cloud infrastructures, the service owners handily scaled
up or down the service pay for hours of using the servers. Therefore
the service providers lose the control over the data in the cloud, data
as in intimacy and query solitude become leading concerns.
Attackers as service providers, possibly make a copy of the DB or
eavesdrop user’s queries are difficult to detect/ prevent in the
infrastructures of cloud. During the time that new approaches are
needed to maintain data confidentiality and query solitude the
efficiency of query services using the clouds should also be
preserved.
The existing approaches such as crypto index approach puts
heavy burden on the in-house infrastructure to enhance security and
privacy, order preserving encryption are open to the attacks and New
Casper approach uses cloaking boxes to protect data along with
queries produce efficiency of query processing including in-house
workload.
In this project we propose random space perturbation (RASP)
perturbation method to provide shield are able to minimize the in-
house processing workload , FSR-Tree is used to provide efficient
range query are able to kNN query services for protecting data in the
cloud.
The basic idea is to randomly transform the multidimensional
data sets with a combination of order preserving encryption,
dimensionality enlarged, random noise injection, and random
project, so that utility for processing range queries is preserved.
The Random Space Perturbation is designed in such some way
that the queried ranges are securely transformed into polyhedral in
RASP-perturbed data space, efficiently processed with help of
indexing structures in the perturbed space.
The Random Space Perturbation approach preserves the topology
of multidimensional range in secure transformation that permits
indexing together with efficiently queries processing. The proposed
service constructions are ready to minimize the in-house processed
workload as low perturbation cost and high precision query results.
This is imperative enabling practical cloud-based solutions.
2 SYSTEM ARCHITECTURE
The system architecture diagram proposed is shown in figure 1. For
both RASP-based range query service, FSR-Tree are separated in to
two groups is the loyal parties and the disloyal parties.
The loyal parties include the data owner exports the perturbed
data to the cloud including authorized users submit queries. The
disloyal parties include the cloud providers who host the query
services furthermore protecting database. Thus, transformation range
queries the client side that handles data encryption/decryption and
query encryption.
The data owner, authorized users submit the original data
,queries to the proxy server; hence proxy server sends the encrypted
data/queries to the service provider, therefore service provider is to
index the encrypted data efficiently process encrypted queries.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
74
Fig.1. System Architecture
Thus transformation range queries are securely transformed to
the encrypted data space efficiently processed with a two-stage
processing algorithm.
3 ORDER PRESERVING ENCRYPTION
In this segment, we present the fundamental definitions of OPE and
its algorithm.
3.1 Definitions of OPE
OPE transform a hypercubic query range into another hyper cubic
query range. An order preserving encryption scheme E, with keys K,
are applied to each dimension of x to change the dimensional
distributions, to the normal distributions with each dimension’s value
order still preserved.
3.2 OPE Algorithm
Order Preserving Encryption is shown in figure 2, thus transforms a
Fig.2. Order Preserving Encryption
hypercubic to form a polyhedron. The query service have to be
compelled to notice, the record within the polyhedron area that is
supported by the two-stage processing algorithm is shown in OPE
algorithm is given below.
Get Transformation_ Range// input from server
Get UserData //input from user
For each lettering in UserData
Start For Each
IntnewPoint;
newPoint = getNewPosition (T_Range, T_Data );
assign new position;
Add to Stack
End for Each
Transform_Data (Stack, UserData)
Return Transformed_Data;
Proposition 1: OPE functions transform a hypercubic query range to
another hypercubic query range.
Proof - The initial range query condition consists of simple
conjunction conditions, is bi ≤ Xi ≤ai for each dimension. Where the
order is preserved, then each simple conjunction condition is
transformed as follows: Tope (bi) ≤Tope (Xi) ≤Tope (ai) that means
the transformed range is still a hyper cubic query range.
Let Tope(x) and ci =Tope (ai). A simple condition Yi ≤ ci
defines a half-space. With the extended dimensions eT
= (yT
,1, v),
the half-space are represented as hT
e≤ 0, where h is a d + 2
dimensional vector with hi = 1; hd+1 = -ci, and hj = 0 for j ≠ i, d + 1.
Finally, let u =Ae, according to the random space perturbation
transformations. With this illustration, the original condition is
equivalent to
hT
A-1
u≤ 0;
in the RASP-perturbed space, is still a half-space condition are
transformed conditions together form a polyhedron. The query
service needs to find the records in the polyhedron area that is
supported by the two-stage query processing algorithm with
multidimensional index tree.
4 FREQUENCY STRUCTURED R-TREE
In this segment, we present the basic definitions of FSR-Tree and its
algorithm.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
75
4.1 Definitions of FSR-Tree
The Frequency Structured R-Tree is designed in such a way that the
queried ranges are securely transformed to polyhedral in the
minimum bounding region efficiently processed with support of
indexing structures in the perturbed space.
4.2 FSR-Tree Algorithm
Frequency Structured R-Tree algorithm gets the user a document,
clean the unwanted space and extra lines, then remove the stop
words from documents like verbs, Adjective then only Keyword is
extracted from the document and resultant shown in R-Tree in query
process is shown in fig. 3.
Fig.3. FSR-Tree Algorithm
FSR-Tree algorithm is good performance for queries is shown in
below.
Get User_Document //input
CleanData=Remove_WhiteSpaces (UserDocucment)
StopwordData=RemoveStopword (CleanData)
Array keyword []=FindFrquency()
Array Attributes=ExtractAttributes (keyword [])
For each attribute in Attributes
Start For
Insert in to Tree
End For Each
Return Tree
5 MULTIDIMENSIONAL INDEX TREE
Most multidimensional index tree algorithms are derived from FSR-
Tree as algorithm, wherever axis-aligned the minimum bounding
region (MBR) is that the construction block for indexing the
multidimensional data. An MBR is a rectangle and for higher
dimensions, the shape of the minimum bounding region is extended
to hypercube. The Frequency Structured R-tree range query
algorithm compares the MBR and the queried range to find the
answers are shown in fig.4. In the first stages of processing
algorithm, the clients finds the MBR of The polyhedron and submit
the MBR (rectangle region) and a set of secured query conditions to
the server.
Fig.4. FSR-Tree index
Thus server uses the index tree to find the set of records enclosed by
the MBR (rectangular region) and in the second stage of processing
algorithm the minimum bounding region of the polyhedron will
possibly enclose the entire data set which is extracted from the first
stage and the second stage dataset is reduced and the return the exact
range query result to the proxy server that significantly reduces the
post processing cost that the proxy server needs to take.
6 RANGE QUERY PROCESSING
The original distance-based kNN query processing finds the nearest
k points in the spherical range that is centered at the query point. The
essential plan of our algorithm is to use square ranges, instead of
spherical ranges. A square range is a hypercube that is centered at
the query point and with equal-length edges. We design an algorithm
similar to a binary search to efficiently find the square range.
The range query used to store data in the database and it will
retrieve the records from the database where it can denote some
value between upper and lower boundary. Thus range query is an
important query for several data analysis tasks from simple
aggregation to extra refined machine learning task.
Let Ta be a table and Xi, Xj, and Xk is being the real valued attributes
in Ta, and a, b is constants.
For example, take the counting query. A typical range query
looks as
Select count (*) from Ta where Xi ε [ai; bi] and Xj ε (aj; bj)
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
76
and Xk = ak;
which calculates the number of records in the range defined by
conditions on Xi, Xj, Xk. Range queries applied to arbitrary number
of attributes and conditions of this attributes combined with
conditional operators "and"/"or." we tend to decide every a part of
the query condition that involves just an attribute as a simple
condition. A simple condition as Xi ε [ai; bi], described with two
half-space conditions (Xi ≤ bi , - Xi ≤ a)i. Without loss of generality,
we tend to discuss a way to process half-space conditions as Xi ≤ bi
in this process. A slight modification extends the discussed
algorithms to handle other conditions as Xi < bi and Xi = bi
7 RELATED WORK
7.1 Transforming Queries in the Database
The authorized user to access only authorized portions of data while
in the cloud database scenario takes more responsibilities of indexing
and query processing so that transforming query in the database to
secure the data in the database.
7.2 Unstructured Data Confidentiality
Our scheme enhances data confidentiality without compromising the
unstructured data by using FSR-TREE algorithm for query
processing performance, which also increases the user experience in
the cloud.
SAMPLE RESULTS
8 CONCLUSION
To explaining the working procedure, algorithm and proving its
efficiency theoretically compare with the existing system models. At
the same time, despite the relatively complex proof, the actual
algorithm is quite short evaluation of this concept will be done in
proposed project work where we develop the range query service
furthermore security of both the perturbed data including protecting
queries is carefully scrutinized, for that we also conduct several sets
of experiments to show the efficiency of query processed and the
low cost of in-house processing. We propose random space
perturbation on two aspects: (1) further improve the performance of
query processing for both range queries and FSR-Tree. (2) Formally
analyze the leaked query in the database and access patterns and the
possible effect on both data and query confidentiality by OPE
Algorithm.
9 REFERENCES
[1] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, (2004),“Order
Preserving Encryption for Numeric Data,” Proc. ACM
SIGMOD Int’l Conf. Management of Data .
[2] Alexandra Boldyreva, Nathan Chenette, Younho Lee and Adam
O'Neill,( 2004)” R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu,
(2004),“Order Preserving Encryption for Numeric Data,” Proc.
ACM SIGMOD Int’l Conf. Management of Data .
[3] K. Chen, R. Kavuluru, and S. Guo, (2011)“RASP: Efficient
Multidimensional Range Query on Attack-Resilient Encrypted
Databases,” Proc. ACM Conf. Data and Application Security
and Privacy, pp. 249-260, 2011.
[4] Elaine Shi John Bethencourt,T-H. Hubert Chan Dawn Song
Adrian Perrig (2007) Multi-Dimensional Range Query over
Encrypted Data .
[5] H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra,( 2002)
“Executing SQL over Encrypted Data in the Database-Service-
Provider Model,” Proc. ACM SIGMOD Int’l Conf.
Management of Data, Pages 216-227.
[6] B. Hore, S. Mehrotra, and G. Tsudik, (2004) “A Privacy-
Preserving Index for Range Queries”.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
77
[7] M.F. Mokbel, C. yin Chow, and W.G. Aref,(2006) “The New
Casper: Query Processing for Location Services without
Compromising Privacy,” Proc. 32nd Int’l Conf. Very Large
Databases Conf, pp. 763-774.
[8] S. Papadopoulos, S. Bakiras, and D. Papadias,(2010) “Nearest
Neighbor Search with Strong Location Privacy,” Proc. Very
LargeDatabasesConf.
[9] M.L. Liu, G. Ghinita, C.S. Jensen, and P. Kalnis, (2010)
“Enabling Search Services on Outsourced Private Spatial Data,”
The Int’l J. Very Large Data Base, vol. 19, no. 3, pp. 363-384.
[10] R. Sion, (2005),“Query Execution Assurance for Outsourced
Databases,” Proc. Very Large Databases Conf. (VLDB).

More Related Content

What's hot

Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Jaipal Dhobale
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Adz91 Digital Ads Pvt Ltd
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...JPINFOTECH JAYAPRAKASH
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm amal algedir
 
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning  ClusteringGraphlab Ted Dunning  Clustering
Graphlab Ted Dunning ClusteringMapR Technologies
 
building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...swathi78
 
I03502044049
I03502044049I03502044049
I03502044049theijes
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudIRJET Journal
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Networkijsrd.com
 
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTING
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTINGREPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTING
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTINGcsandit
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535Cory Cook
 

What's hot (18)

Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm
 
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning  ClusteringGraphlab Ted Dunning  Clustering
Graphlab Ted Dunning Clustering
 
building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...
 
I03502044049
I03502044049I03502044049
I03502044049
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Ijsrp p8593
Ijsrp p8593Ijsrp p8593
Ijsrp p8593
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 
Ee4301798802
Ee4301798802Ee4301798802
Ee4301798802
 
46 138-1-pb
46 138-1-pb46 138-1-pb
46 138-1-pb
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
 
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTING
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTINGREPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTING
REPLICATION STRATEGY BASED ON DATA RELATIONSHIP IN GRID COMPUTING
 
CoryCookFinalProject535
CoryCookFinalProject535CoryCookFinalProject535
CoryCookFinalProject535
 

Similar to Optimizing Data Confidentiality using Integrated Multi Query Services

Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...paperpublications3
 
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...hemanthbbc
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...ASAITHAMBIRAJAA
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...LeMeniz Infotech
 
JPJ1404 Building Confidential And Efficient Query Services In The Cloud Wit...
JPJ1404   Building Confidential And Efficient Query Services In The Cloud Wit...JPJ1404   Building Confidential And Efficient Query Services In The Cloud Wit...
JPJ1404 Building Confidential And Efficient Query Services In The Cloud Wit...chennaijp
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...swathi78
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud ComputingRahul Garg
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 

Similar to Optimizing Data Confidentiality using Integrated Multi Query Services (20)

Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
 
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...Ieeepro techno solutions   2013 ieee dotnet project -building confidential an...
Ieeepro techno solutions 2013 ieee dotnet project -building confidential an...
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
1670 1673
1670 16731670 1673
1670 1673
 
1670 1673
1670 16731670 1673
1670 1673
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...Building confidential and efficient query services in the cloud with rasp dat...
Building confidential and efficient query services in the cloud with rasp dat...
 
JPJ1404 Building Confidential And Efficient Query Services In The Cloud Wit...
JPJ1404   Building Confidential And Efficient Query Services In The Cloud Wit...JPJ1404   Building Confidential And Efficient Query Services In The Cloud Wit...
JPJ1404 Building Confidential And Efficient Query Services In The Cloud Wit...
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...building confidential and efficient query services in the cloud with rasp dat...
building confidential and efficient query services in the cloud with rasp dat...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
Data Replication In Cloud Computing
Data Replication In Cloud ComputingData Replication In Cloud Computing
Data Replication In Cloud Computing
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Optimizing Data Confidentiality using Integrated Multi Query Services

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 73 Optimizing Data Confidentiality using Integrated Multi Query Services J.Srilatha1 S.Kerthy2 1 Anna University, Department of CSE, 2 Anna University, Department of CSE, latha2k@yahoo.co.in skerthy_it@yahoo.com Abstract — Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR- Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience. Index Terms — Confidentiality, FSR-Tree, Minimum bounding Region, Range query, Query privacy. ——————————  —————————— 1 INTRODUCTION Due to the plenty of users query services has shifted to the Cloud for their non-interrupted accessibility to reduce the infrastructure cost. With these cloud infrastructures, the service owners handily scaled up or down the service pay for hours of using the servers. Therefore the service providers lose the control over the data in the cloud, data as in intimacy and query solitude become leading concerns. Attackers as service providers, possibly make a copy of the DB or eavesdrop user’s queries are difficult to detect/ prevent in the infrastructures of cloud. During the time that new approaches are needed to maintain data confidentiality and query solitude the efficiency of query services using the clouds should also be preserved. The existing approaches such as crypto index approach puts heavy burden on the in-house infrastructure to enhance security and privacy, order preserving encryption are open to the attacks and New Casper approach uses cloaking boxes to protect data along with queries produce efficiency of query processing including in-house workload. In this project we propose random space perturbation (RASP) perturbation method to provide shield are able to minimize the in- house processing workload , FSR-Tree is used to provide efficient range query are able to kNN query services for protecting data in the cloud. The basic idea is to randomly transform the multidimensional data sets with a combination of order preserving encryption, dimensionality enlarged, random noise injection, and random project, so that utility for processing range queries is preserved. The Random Space Perturbation is designed in such some way that the queried ranges are securely transformed into polyhedral in RASP-perturbed data space, efficiently processed with help of indexing structures in the perturbed space. The Random Space Perturbation approach preserves the topology of multidimensional range in secure transformation that permits indexing together with efficiently queries processing. The proposed service constructions are ready to minimize the in-house processed workload as low perturbation cost and high precision query results. This is imperative enabling practical cloud-based solutions. 2 SYSTEM ARCHITECTURE The system architecture diagram proposed is shown in figure 1. For both RASP-based range query service, FSR-Tree are separated in to two groups is the loyal parties and the disloyal parties. The loyal parties include the data owner exports the perturbed data to the cloud including authorized users submit queries. The disloyal parties include the cloud providers who host the query services furthermore protecting database. Thus, transformation range queries the client side that handles data encryption/decryption and query encryption. The data owner, authorized users submit the original data ,queries to the proxy server; hence proxy server sends the encrypted data/queries to the service provider, therefore service provider is to index the encrypted data efficiently process encrypted queries.
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 74 Fig.1. System Architecture Thus transformation range queries are securely transformed to the encrypted data space efficiently processed with a two-stage processing algorithm. 3 ORDER PRESERVING ENCRYPTION In this segment, we present the fundamental definitions of OPE and its algorithm. 3.1 Definitions of OPE OPE transform a hypercubic query range into another hyper cubic query range. An order preserving encryption scheme E, with keys K, are applied to each dimension of x to change the dimensional distributions, to the normal distributions with each dimension’s value order still preserved. 3.2 OPE Algorithm Order Preserving Encryption is shown in figure 2, thus transforms a Fig.2. Order Preserving Encryption hypercubic to form a polyhedron. The query service have to be compelled to notice, the record within the polyhedron area that is supported by the two-stage processing algorithm is shown in OPE algorithm is given below. Get Transformation_ Range// input from server Get UserData //input from user For each lettering in UserData Start For Each IntnewPoint; newPoint = getNewPosition (T_Range, T_Data ); assign new position; Add to Stack End for Each Transform_Data (Stack, UserData) Return Transformed_Data; Proposition 1: OPE functions transform a hypercubic query range to another hypercubic query range. Proof - The initial range query condition consists of simple conjunction conditions, is bi ≤ Xi ≤ai for each dimension. Where the order is preserved, then each simple conjunction condition is transformed as follows: Tope (bi) ≤Tope (Xi) ≤Tope (ai) that means the transformed range is still a hyper cubic query range. Let Tope(x) and ci =Tope (ai). A simple condition Yi ≤ ci defines a half-space. With the extended dimensions eT = (yT ,1, v), the half-space are represented as hT e≤ 0, where h is a d + 2 dimensional vector with hi = 1; hd+1 = -ci, and hj = 0 for j ≠ i, d + 1. Finally, let u =Ae, according to the random space perturbation transformations. With this illustration, the original condition is equivalent to hT A-1 u≤ 0; in the RASP-perturbed space, is still a half-space condition are transformed conditions together form a polyhedron. The query service needs to find the records in the polyhedron area that is supported by the two-stage query processing algorithm with multidimensional index tree. 4 FREQUENCY STRUCTURED R-TREE In this segment, we present the basic definitions of FSR-Tree and its algorithm.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 75 4.1 Definitions of FSR-Tree The Frequency Structured R-Tree is designed in such a way that the queried ranges are securely transformed to polyhedral in the minimum bounding region efficiently processed with support of indexing structures in the perturbed space. 4.2 FSR-Tree Algorithm Frequency Structured R-Tree algorithm gets the user a document, clean the unwanted space and extra lines, then remove the stop words from documents like verbs, Adjective then only Keyword is extracted from the document and resultant shown in R-Tree in query process is shown in fig. 3. Fig.3. FSR-Tree Algorithm FSR-Tree algorithm is good performance for queries is shown in below. Get User_Document //input CleanData=Remove_WhiteSpaces (UserDocucment) StopwordData=RemoveStopword (CleanData) Array keyword []=FindFrquency() Array Attributes=ExtractAttributes (keyword []) For each attribute in Attributes Start For Insert in to Tree End For Each Return Tree 5 MULTIDIMENSIONAL INDEX TREE Most multidimensional index tree algorithms are derived from FSR- Tree as algorithm, wherever axis-aligned the minimum bounding region (MBR) is that the construction block for indexing the multidimensional data. An MBR is a rectangle and for higher dimensions, the shape of the minimum bounding region is extended to hypercube. The Frequency Structured R-tree range query algorithm compares the MBR and the queried range to find the answers are shown in fig.4. In the first stages of processing algorithm, the clients finds the MBR of The polyhedron and submit the MBR (rectangle region) and a set of secured query conditions to the server. Fig.4. FSR-Tree index Thus server uses the index tree to find the set of records enclosed by the MBR (rectangular region) and in the second stage of processing algorithm the minimum bounding region of the polyhedron will possibly enclose the entire data set which is extracted from the first stage and the second stage dataset is reduced and the return the exact range query result to the proxy server that significantly reduces the post processing cost that the proxy server needs to take. 6 RANGE QUERY PROCESSING The original distance-based kNN query processing finds the nearest k points in the spherical range that is centered at the query point. The essential plan of our algorithm is to use square ranges, instead of spherical ranges. A square range is a hypercube that is centered at the query point and with equal-length edges. We design an algorithm similar to a binary search to efficiently find the square range. The range query used to store data in the database and it will retrieve the records from the database where it can denote some value between upper and lower boundary. Thus range query is an important query for several data analysis tasks from simple aggregation to extra refined machine learning task. Let Ta be a table and Xi, Xj, and Xk is being the real valued attributes in Ta, and a, b is constants. For example, take the counting query. A typical range query looks as Select count (*) from Ta where Xi ε [ai; bi] and Xj ε (aj; bj)
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 76 and Xk = ak; which calculates the number of records in the range defined by conditions on Xi, Xj, Xk. Range queries applied to arbitrary number of attributes and conditions of this attributes combined with conditional operators "and"/"or." we tend to decide every a part of the query condition that involves just an attribute as a simple condition. A simple condition as Xi ε [ai; bi], described with two half-space conditions (Xi ≤ bi , - Xi ≤ a)i. Without loss of generality, we tend to discuss a way to process half-space conditions as Xi ≤ bi in this process. A slight modification extends the discussed algorithms to handle other conditions as Xi < bi and Xi = bi 7 RELATED WORK 7.1 Transforming Queries in the Database The authorized user to access only authorized portions of data while in the cloud database scenario takes more responsibilities of indexing and query processing so that transforming query in the database to secure the data in the database. 7.2 Unstructured Data Confidentiality Our scheme enhances data confidentiality without compromising the unstructured data by using FSR-TREE algorithm for query processing performance, which also increases the user experience in the cloud. SAMPLE RESULTS 8 CONCLUSION To explaining the working procedure, algorithm and proving its efficiency theoretically compare with the existing system models. At the same time, despite the relatively complex proof, the actual algorithm is quite short evaluation of this concept will be done in proposed project work where we develop the range query service furthermore security of both the perturbed data including protecting queries is carefully scrutinized, for that we also conduct several sets of experiments to show the efficiency of query processed and the low cost of in-house processing. We propose random space perturbation on two aspects: (1) further improve the performance of query processing for both range queries and FSR-Tree. (2) Formally analyze the leaked query in the database and access patterns and the possible effect on both data and query confidentiality by OPE Algorithm. 9 REFERENCES [1] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, (2004),“Order Preserving Encryption for Numeric Data,” Proc. ACM SIGMOD Int’l Conf. Management of Data . [2] Alexandra Boldyreva, Nathan Chenette, Younho Lee and Adam O'Neill,( 2004)” R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, (2004),“Order Preserving Encryption for Numeric Data,” Proc. ACM SIGMOD Int’l Conf. Management of Data . [3] K. Chen, R. Kavuluru, and S. Guo, (2011)“RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases,” Proc. ACM Conf. Data and Application Security and Privacy, pp. 249-260, 2011. [4] Elaine Shi John Bethencourt,T-H. Hubert Chan Dawn Song Adrian Perrig (2007) Multi-Dimensional Range Query over Encrypted Data . [5] H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra,( 2002) “Executing SQL over Encrypted Data in the Database-Service- Provider Model,” Proc. ACM SIGMOD Int’l Conf. Management of Data, Pages 216-227. [6] B. Hore, S. Mehrotra, and G. Tsudik, (2004) “A Privacy- Preserving Index for Range Queries”.
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 77 [7] M.F. Mokbel, C. yin Chow, and W.G. Aref,(2006) “The New Casper: Query Processing for Location Services without Compromising Privacy,” Proc. 32nd Int’l Conf. Very Large Databases Conf, pp. 763-774. [8] S. Papadopoulos, S. Bakiras, and D. Papadias,(2010) “Nearest Neighbor Search with Strong Location Privacy,” Proc. Very LargeDatabasesConf. [9] M.L. Liu, G. Ghinita, C.S. Jensen, and P. Kalnis, (2010) “Enabling Search Services on Outsourced Private Spatial Data,” The Int’l J. Very Large Data Base, vol. 19, no. 3, pp. 363-384. [10] R. Sion, (2005),“Query Execution Assurance for Outsourced Databases,” Proc. Very Large Databases Conf. (VLDB).