Submit Search
Upload
IRJET- E-Commerce Website using Skyline Queries
•
0 likes
•
10 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i3/IRJET-V7I3711.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...
IJECEIAES
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET Journal
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
Recommended
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...
IJECEIAES
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET Journal
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
Fully Homomorphic Encryption Using Low Power Multiplier
Fully Homomorphic Encryption Using Low Power Multiplier
IJERA Editor
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
IOSR Journals
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
Secure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process mining
Gamal Elkoumy
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Publishing House
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
Tharindu Weerasinghe
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
IJAAS Team
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
More Related Content
What's hot
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
Fully Homomorphic Encryption Using Low Power Multiplier
Fully Homomorphic Encryption Using Low Power Multiplier
IJERA Editor
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET Journal
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
IOSR Journals
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
Secure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process mining
Gamal Elkoumy
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Publishing House
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
Tharindu Weerasinghe
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
IJAAS Team
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
What's hot
(18)
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Fully Homomorphic Encryption Using Low Power Multiplier
Fully Homomorphic Encryption Using Low Power Multiplier
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
Secure multi party computation for inter-organizational process mining
Secure multi party computation for inter-organizational process mining
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
Similar to IRJET- E-Commerce Website using Skyline Queries
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET Journal
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
Similar to IRJET- E-Commerce Website using Skyline Queries
(20)
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET- Security, Issues and Algorithm and their Performance Analysis
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
Call girls in Ahmedabad High profile
Recently uploaded
(20)
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
IRJET- E-Commerce Website using Skyline Queries
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3544 E-COMMERCE WEBSITE USING SKYLINE QUERIES N R Vishnu Priya 1, Emayal R M2, Little Libisha A3 1Assistant Professor, Department of Information Technology, Jeppiaar SRR Engineering College, Chennai 2,3Students, Department of Information Technology, Jeppiaar SRR Engineering College, Chennai. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – In these modern days every one prefer online shopping .The main problem faced by customers are unaffordable price, cannot BG directly etc., The website provide the details about the products and offers on products to user .User can buy and even bargain through e-commerce website. The Pre -processing on data can be performed by admin to send to web server. User can easily buy the product through websites which is efficient on big data broadcasting. The SQL data’s are also used in banking process and further pave way for payment .The skl quries are main component for the pre-processing. Key Words: Bargain (BG), SkyLine Queries(SKL) 1. INTRODUCTION The main aim of this paper is to study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decisionmakingbut also presents significant challenges due to its complex computations. The emerging computing paradigm, cloud computing attracts increasing attention from both research and industry communities. Outsourcing data and computation to cloud server provides a cost effective way to support large scale data storage and query processing. However, due tosecurityandprivacyconcerns,sensitivedata need to be protected from the cloud server as well as other unauthorized users. In this paper we focus on the problemof secure skyline queries on encrypted data, another type of similarity search important for multi-criteria decision making. The skyline or Pareto of a multi-dimensionaldataset given a query point consists of the data points that are not dominated by other points.A data pointdominatesanotherif it is closer to the query point in at least one dimension and at least as close to the query point in every other dimension. The skyline query is particularly useful for selecting similar (or best) records when a single aggregated distance metric with all dimensions is hard to define. 2. RELATED WORKS ShaiHalevi[1]:VictorShould Gentry'sbootstrapping technique is still the only known method of obtaining fully homomorphic ncryption where the system's parameters do not depend on the complexity of the evaluated functions. Bootstrapping involves a decryption procedure where the scheme's decryption algorithm is evaluated homomorphically. Prior to this work there were very few implementations of recryption, and fewer still that can handle packed ciphertexts" that encrypt vectors of elements. In the current work, we report on an implementation of recryption of fully-packed ciphertexts using the HElib library for somewhat-homomorphic encryption. This implementation required extending previous recryptionalgorithms fromtheliterature,aswell as many aspects of the HElib library. Our implementation supports bootstrapping of packed ciphertexts over many extension _elds/rings. One example that we tested involves ciphertexts that encrypt vectors of 1024 elements from GF(216). In that setting, the recryption procedure takes under 3 minutes (at security-level _ 80) on a single core, and allows a multiplicative depth-11 computation before the next recryption is needed. This report updates the results that we reported in Eurocrypt 2015 in several ways. Most importantly, it includes a much more robust method for deriving the parameters, ensuring that recryption errors only occur with negligible probability. Many aspects of this analysis are proven, and for the few well-speci_fied heuristics that we made, we report on thorough experimentation to validate them. The procedure that we describe here is also signi_cantly more effi_cient than in the previous version, incorporating many optimizations that were reported elsewhere (such as more effi_cient linear transformations) and adding a few new ones. Finally, our implementation now also incorporates Chen and Han's techniques from Eurocrypt 2018 for more effi_cient digit extraction (for some parameters), as well as for thin bootstrapping" when the ciphertext is only sparsely packed. Long Chen1,2 and Zhenfeng Zhang [2]: Despite a great deal of progress in recent years, efficiency of fully homomorphic encryption (FHE) is still a major concern. Specifically, the bootstrapping procedure is the most costly part of a FHE scheme. FHE schemes with ring element plaintexts, such as the ring-LWE based BGV scheme, are the most efficientones, since they can not only encrypt a ring element instead of a single bit in one ciphertext, but also support CRT-based ciphertext packing techniques. Thanks to homomorphic operations in a SIMD fashion (Single Instruction Multiple Data), the ring-LWE BGV scheme can achieve a nearly optimal homomorphic evaluation. However, the BGV scheme, as implemented in HElib, can only bootstrap within super-polynomial noise so far. Note thatsucha noiseratefor a ring-LWE based scheme is less safe and more costly, because one has to choose larger dimensions to ensure security. On the other hand, existing polynomial noise bootstrapping techniques can only be applied to FHE schemes with bit plaintexts. In this paper, we provid plaintexts. Specifically, our bootstrapping method allows users to choose any plaintext modulus p > 1 and any modulus polynomial Φ(X) for the BGV scheme. Our
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3545 bootstrapping methodincursonlypolynomial errorO(n3)·B for lattice dimension n and noise bound B comparing to (B · poly(n)) ˜O (log(n))forpreviousbestmethods.Concretely,to achieve 70 bit security, the dimension of the lattice that we use is no more than 212, while previous methods in HElib need about 214 to 2 Manish Kesarwani, Akshar Kaul, Prasad Naldurg[3]:Enterprise customers of cloud services arewary of outsourcing sensitive user and business data due to inherent security and privacy concerns. In this context, storing and computing directly on encrypted data is an attractive solution, especially against insider attacks. Homomorphic encryption,thekeystone enablingtechnology is unfortunately prohibitively expensive. In this paper, we focus on finding k-Nearest Neighbours (k-NN) directly on encrypted data, a basic data-mining and machine learning algorithm. Wenhui Yu, Zheng Qin, Jinfei Liu[4]:Skyline, aiming at €nding a Pareto optimal subset of points in a multi- dimensional dataset, has gained great interest due to its extensive use formulti-criteriaanalysis anddecisionmaking. Skyline consists of all points that are not dominated by, or not worse than other points. It is a candidate set of optimal solution, which depends ona speci€c evaluationcriterion for optimum. However, conventional skyline queries, which return individual points, are inadequate in group querying case since optimal combinations are required. To address this gap, we study the skyline computationingroupcaseand propose fast methods to €nd the group-based skyline (G- skyline), which contains Pareto optimal groups. For computing the front k skyline layers, we lay out an efficient approach that does the search concurrently on each dimension and investigates each pointinsubspace.A.erthat, we present a novel structure to construct the G-skyline with a queue of combinations of the €rst-layer points. Experimental results show that our algorithms are several orders of magnitude faster than the previous work. Twaha Ahmadi Fuko[5]:Intel SGX provides, record level, secure hardware enabled execution environment for program and data to ensure its confidentiality and integrity. However, this work focuses mainly onmemorymanagement aspect of Intel SGX. It is an attempt to explain how Intel SGX implements hardware control structures such as virtual memory, data structures, address translation, translation look-aside buffer (TLB), memory management techniques and how it puts processor’s memory management unit in action. 3. PROPOSED SYSTEM In the proposed system, there is bit of communication between the data owner and user about the price of the product. We are usingskylinequeriesonbig data broadcasting to display the prioritized products. By using preprocessing we are converting the uncategorized file into categorized file and update into webserver. Also , the big data broadcasting is used tocomparetheserversanddisplay the data using skyline queries .And finally the combo offers with item based recommendation are also done . We used a completely secure skyline protocol on encrypted data using skyline queries. It ensures semantic security therein the cloud server knows nothing aboutthedata includingindirect data patterns, query, also because the query result. Additionally, the client and data owner don't need to participate within the computation. 4. PROPOSED ARCHITECTURE 5. METHODOLOGY 5.1 SECURE SKYLINE PROTOCOL In the section, we propose a basic secure skyline protocol and show why such an easy solution isn't secure. Then we propose a fully secure skyline protocol. skyline query q, it's like compute the skyline during a transformed space with the query point q because the origin and therefore the absolute distances to q as mapping functions. Hence we first show a preprocessingwhichmapsthedataset to the new space. Since the skyline only depends on the order of the attribute values, we use (pi[j] − q[j])2 which is simpler to compute than |pi[j] − q[j]| because the mapping function. 5.2 DYNAMIC SKYLINE QUERY Skyline Definitions Definitiondimensional pis areP, a[j] the we those ≤ jsay th 1. pbdimension points [j], (Skyline). pa space. dominates which for Let of are Given at ppleast i pnot a band , and a denoted dominated one 1 dataset p≤ b j, be j p≤ aby [j] two P m. by p= < a the various any p≺ {pb[j], p1skyline , other b...,p, points n} in m- in if for all j, where points pi[j] . Mapped data = q |pin i[j]−q[j]|+q[j]. The space, original and space.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3546 5.3 FULLY SECURED PROTOCOL The data is secure and properly selects the skyline tuple if there's just one minimum. To address this, we employ order-preserving perturbation which adds a set of mutually different bit sequence to a set of values such that: 1) if the original values are equal to each other, the perturbed values are guaranteednot equal toeachother, and 2) if the original values are not equal to each other, their order is preserved. Concretely, given n numbers in their binary representations, we add a ⌈logn⌉-bit sequence to the end of each Epk(S(ti)), each represents a unique bit sequence in the range of [0,n − 1]. This way, the perturbed values are guaranteed to be different from each other while their order is preserved since the added bits are the least significant bits. Line 10 of Algorithm 5 shows this step. We note that we can multiply each sum Epk(S(ti)) by n and uniquely add a value from [0,n − 1] to each Epk(S(ti)), hence guarantee they are not equal to each other. 6. MODULE DESCRIPTION A common approach to guard the confidentiality of outsourced data is to encrypt the info . to guard the confidentiality of the query from cloud authorized clients also send encrypted queries to the cloud server. Figure 1 illustrates our problem scenario of secure query processing over encrypted data within the cloud. The info owner outsources encrypted data to the cloud server. The cloud server handles the queries of client on the encrypted data and returns the query result to the client. During the query processing, the cloud server shouldn't gain any knowledge about the info, data patterns, query, and query result. 6.1 Admin and User Authentication User has an initial level Registration Process at the online end. The users have to provide required information for process. The server successively stores the knowledge in its database, then by using the registered information the user can login by their respective credentials which they created during the registration process. of these processavail forthe admin also. 6.2 Search for the products In this module the user can see the n number of products as their wish and they can view the reviews and ratings of the particular product .If the user wants to buy the product they can search the product with their respective name and the key word. It shows a lot of options for you to choose and select the quality product by using the rating and review which is given by the other users and also it shows the most relevant product at the top. 6.3 Bargain with the Admin In this module after you select the products and identifying the price if the user is not satisfied with price given by the respective sellers they can bargainthemandyoucansuggest the price which you want to buy and if the admin is accepted your request you can buy this product with the satisfaction and if he is willing to the price he can able reject proposal which was given by you. 6.4 Suggest Related Products with Offers In this module after ready to buy the product withtheabove advantages you will get the relevant products which you wanted to buy and it comes with offer which is easy and simple way to buy the product. The combo offer will be recommended. 7. RESULT Therefore, by using these algorithms and technologies we can buy products through e-commerce website by using the latest technique on skyline queries. 8. CONCLUSION This processes are secure andefficientinthesemoderndays. This process is mainly time consuming. Cloud computing attracts increasing attention from both research and industry communities. Outsourcingdata andcomputation to cloud server provides a price effective thanks to support large scale data storage and query processing.However, due to security and privacy concerns, sensitive data need to be protected from the cloud server as well as other unauthorized users. We present a setofsecuresubprotocols for computing basic functions on encrypted data that will be used to construct our secure skylinequeryprotocol.Wehave also designed a parallel framework for effective reducing computation time together with the two optimizations, data partitioning and lazy merging.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3547 9. FUTURE ENHANCEMENTS In the proposed system, there is bit of communication between the data owner and user about the price of the product. We are using skyline queries on big data broadcasting to display the prioritized products. By using preprocessing we are converting the uncategorized file into categorized file and update into webserver. Also , the big data broadcasting is used tocomparetheserversanddisplay the data using skyline queries .And finally the combo offers with item based recommendation are also done . REFERENCES [1] F. Baldimtsi and O. Ohrimenko. Sorting and searching behind the curtain. In FC 2015, pages 127–146, 2015. [2] A. Beimel. Secret-sharing schemes: a survey. In International Conference on Coding and Cryptology, pages 11–46. Springer, 2011. [3] J.L. Bentley. Multidimensional divide-and-conquer. Commun. ACM, 23(4):214–229, 1980. [4] J. L. Bentley, H. T. Kung, M. Schkolnick, and C. D. Thompson. On the average number of maxima in a set of vectors and applications. J. ACM, 25(4):536–543, 1978. [5] S. B¨orzs¨onyi, D. Kossmann, and K. Stocker. The skyline operator. In ICDE 2001. [6] S. Bothe, A. Cuzzocrea, P. Karras, and A. Vlachou. Skyline query processing over encrypted data: An attribute-order- preserving-free approach. In PSBD@CIKM, pages 37–43, 2014. [7] S. Bothe, P. Karras, and A. Vlachou. eskyline: Processing skyline queries over encrypted data. PVLDB, 6(12):1338– 1341, 2013. [8] C. Y. Chan, H. V. Jagadish, K.-L. Tan, A. K. H. Tung, and Z. Zhang. Finding k-dominant skylines in high dimensional space. In SIGMOD Conference, pages 503–514, 2006. [9] W. Chen, M. Liu, R. Zhang, Y. Zhang, and S. Liu. Secure outsourced skyline query processing via un trusted cloud service providers. In INFOCOM 2016. [10] V. Costan and S. Devadas. Intel sgx explained. Technical report, Cryptology ePrint Archive, Report 2016/086, 20 16. http://eprint. iacr. org.
Download now