SlideShare a Scribd company logo
1 of 28
K NEAREST NEIGHBOUR CLASSIFICATION OVER
SEMANTICALLY SECURE ENCRYPTED RELATIONAL
DATA
By
V Lakshmi
CONTENTS
 Abstract
 Problem Statement
 Existing System
 Proposed System
 Disadvantages
 Advantages
 System Specifications
 UML diagrams
 Implementation
 Results
 Conclusion
ABSTRACT :
Data Mining has wide applications in many
areas such as banking, medicine, scientific research and
among government agencies. Classification is one of the
commonly used tasks in data mining applications. For the
past decade, due to the rise of various privacy issues, many
theoretical and practical solutions to the classification
problem have been proposed under different security
models.
PROBLEM STATEMENT:
 To Focus on solving the classification problem
over Encrypted data
EXISTING SYSTEM:
 The system is implemented fully homomorphic cryptosystems
can solve the DMED problem.
 since it allows a third-party (that hosts the encrypted data) to
execute arbitrary functions over encrypted data without ever
decrypting them.
PROPOSED SYSTEM:
 The system proposed novel methods to effectively
solve the DMED problem assuming that the
encrypted data are outsourced to a cloud.
 The system focuses on the classification problem
since it is one of the most common data mining
tasks.
ADVANTAGES :
 It protects the confidentiality of data, privacy of
user’s input query.
 Hides data access patterns.
 Data records correspond to the k-nearest
neighbours and the output class label are not
known to the cloud.
DISADVANTAGES:
 Perturbed data do not possess semantic security.
SYSTEM SPECIFICATION
Hardware Requirements:
 System : Pentium IV 3.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Ram : 1 GB.
Software Requirements:
 Operating system : Windows 7
 Coding Language : J2EE(JSP,Servlet,JavaBean)
 Data Base : MY Sql Server.
 Web Server : Tomcat 6.0
FUNCTIONAL REQUIREMENTS :
Data Owner :
 Login
 Upload Data
 View Data and features
 Add common Questions construction
Data Server :
o view all files
o View attacks
o Encrypted files
USER
o Registration
 Login
 View and choose Data features
NON-FUNCTIONAL REQUIREMENTS
 Usability
 Reliability
 Performance
 Security
UML DIAGRAMS :
:
Data Server
End User
Browse File
Encrypt File
Send File
Upload
Response
Store Encrypted Data
asdfa
View Attackers
asdfa
View Owner Files
asdfa
View Attackers
asdfa
Search for both SSED and
K nearest neighbor search
View ‘N’ Ranked Data
Request data
Data Owner
Retrieve and store data
Usecase diagram:
Members
Methods
Methods
Members
Members
Methods
Members
Methods
Methods
Members
Browse File, Encrypt File ,
Upload File, View All, Exit,
View_owner_Files
Select File Name, Owner
Name, Owner File
Data Owner
View all Owner Files, View
Attacks,Store_Files,Authori
ze_Files,Authorize
users,Encrypted_Files
File ID, File Name, Owner
Name, Secret Key, User
Details, File Access Details,
View User Property,
Hackers, Exit
Data Server
Login, Register, Reset
User Name, Password
Login
Register, Reset
Name, Password, DOB,
Gender, Address, City,
Country, Email, Mobile
Register
Search File Based_
On_ SSED and K
nearest neighbor
search, Exit, Register,
and Login
Fname,rank,usernam
e,secret_key
Receiver
Class diagram :
SEQUENCE DIAGRAM
Browse & uploads file
File sent confirmation
Search response
Search response
Searching file for SPCHS and IBKEM
Gives secret key
Request secret key
View all data
provider files
Data provider End userData server
Checks file names
& aggregate key
Request SK
Save files
Download file
Check files name
and Secret key
•
Response
Response
Request Response
Data Owner Upload Enc Files Data Server
Response for both
the techniques such
as SSED and K
nearest neighbor
search with
searching ratio
End User
Request
Data by
keyword
Response data sent
information
Request
Find the Data Set
and upload data
Data flow diagram
Architecture Diagram
Data
Owner
End User
DATA SERVER
1) View user Details
2) View Attacker
Details
3) Unblock User
1) Registers & Login
1) Registers & Logins
Browse and enc
and Uploads files
with keywords, enc
keyword also.
1) Searches for files based on
Content’s keyword
2) Requests for Skey
3) Requests for downloading files
4) Find the file search ratio
5) Find all K Nearest Neighbor
search documents
Archiecture Dig Cont..
IMPLEMENTATION :
 Data provider
 Data Server
 END User
DATA PROVIDER
 In this module, the data provider uploads their data
in the Data server. For the security purpose the
data owner encrypts the data file and then store in
the server. The Data owner can have capable of
manipulating the encrypted data file.
DATA SERVER
 The Data server manages which is to provide data
storage service for the Data Owners. Data owners
encrypt their data files and store them in the Server for
sharing with data consumers. To access the shared data
files, data consumers download encrypted data files of
their interest from the Server and then Server will
decrypt them. The server will generate the aggregate
key if the end user requests multiple files at the same
time to access.
END USER
 In this module, the user can only access the data
file with the encrypted key word. The user can
search the file for both the methods such as SSED
and K nearest neighbor search. The user has to
register and then login from the Data server.
RESULTS:
DATA SERVER
DATA OWNER
DATA OWNER
OWNER DETAILS
TRANSACTIONS
DATA SERVER FILES
END USER
END USER
CONCLUSION
 To protect user privacy, various privacy-preserving
classification techniques have been proposed over
the past decade. The existing techniques are not
applicable to outsourced database environments
where the data resides in encrypted form on a third-
party server.
 This project proposed a novel privacy-preserving k-
NN classification protocol over encrypted data in
the server. This protocol protects the confidentiality
of the data, user’s input query, and hides the data
access patterns.

More Related Content

What's hot

Active directory
Active directoryActive directory
Active directoryMuuluu
 
Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Carol Geyer
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory ServicesVarun Arora
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecturerahuldaredia21
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structureJohn Carlo Catacutan
 
Active directory basics
Active directory basicsActive directory basics
Active directory basicsSanjeev Gupta
 
Overview Of ADO .NET from Wingslive.com
Overview Of ADO .NET from Wingslive.comOverview Of ADO .NET from Wingslive.com
Overview Of ADO .NET from Wingslive.comWings Interactive
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesMichael Noel
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8sJhonnatan Gil
 
Ssis2008 120710214348-phpapp02
Ssis2008 120710214348-phpapp02Ssis2008 120710214348-phpapp02
Ssis2008 120710214348-phpapp02sumitkumar3201
 

What's hot (14)

Active directory
Active directoryActive directory
Active directory
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020Open Cybersecurity Alliance Briefing at RSAC 2020
Open Cybersecurity Alliance Briefing at RSAC 2020
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Ado
AdoAdo
Ado
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecture
 
Designing the active directory logical structure
Designing the active directory logical structureDesigning the active directory logical structure
Designing the active directory logical structure
 
12
1212
12
 
Active directory basics
Active directory basicsActive directory basics
Active directory basics
 
Overview Of ADO .NET from Wingslive.com
Overview Of ADO .NET from Wingslive.comOverview Of ADO .NET from Wingslive.com
Overview Of ADO .NET from Wingslive.com
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
 
Session x(ado.net)
Session x(ado.net)Session x(ado.net)
Session x(ado.net)
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8s
 
Ssis2008 120710214348-phpapp02
Ssis2008 120710214348-phpapp02Ssis2008 120710214348-phpapp02
Ssis2008 120710214348-phpapp02
 

Similar to KNN Classification Over Semantically secure Encrypt Data

Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...sharathdj
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
Comprehensive Study on Data Security in Cloud Data Store
Comprehensive Study on Data Security in  Cloud Data StoreComprehensive Study on Data Security in  Cloud Data Store
Comprehensive Study on Data Security in Cloud Data StoreDirarDarweesh
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseEDB
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on CloudSupriya .
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxgattamanenitejeswar
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 

Similar to KNN Classification Over Semantically secure Encrypt Data (20)

Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Paper2
Paper2Paper2
Paper2
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
Comprehensive Study on Data Security in Cloud Data Store
Comprehensive Study on Data Security in  Cloud Data StoreComprehensive Study on Data Security in  Cloud Data Store
Comprehensive Study on Data Security in Cloud Data Store
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on Cloud
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
review exicution
review exicutionreview exicution
review exicution
 

Recently uploaded

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Recently uploaded (20)

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

KNN Classification Over Semantically secure Encrypt Data

  • 1. K NEAREST NEIGHBOUR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATIONAL DATA By V Lakshmi
  • 2. CONTENTS  Abstract  Problem Statement  Existing System  Proposed System  Disadvantages  Advantages  System Specifications  UML diagrams  Implementation  Results  Conclusion
  • 3. ABSTRACT : Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models.
  • 4. PROBLEM STATEMENT:  To Focus on solving the classification problem over Encrypted data EXISTING SYSTEM:  The system is implemented fully homomorphic cryptosystems can solve the DMED problem.  since it allows a third-party (that hosts the encrypted data) to execute arbitrary functions over encrypted data without ever decrypting them.
  • 5. PROPOSED SYSTEM:  The system proposed novel methods to effectively solve the DMED problem assuming that the encrypted data are outsourced to a cloud.  The system focuses on the classification problem since it is one of the most common data mining tasks.
  • 6. ADVANTAGES :  It protects the confidentiality of data, privacy of user’s input query.  Hides data access patterns.  Data records correspond to the k-nearest neighbours and the output class label are not known to the cloud. DISADVANTAGES:  Perturbed data do not possess semantic security.
  • 7. SYSTEM SPECIFICATION Hardware Requirements:  System : Pentium IV 3.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Ram : 1 GB. Software Requirements:  Operating system : Windows 7  Coding Language : J2EE(JSP,Servlet,JavaBean)  Data Base : MY Sql Server.  Web Server : Tomcat 6.0
  • 8. FUNCTIONAL REQUIREMENTS : Data Owner :  Login  Upload Data  View Data and features  Add common Questions construction Data Server : o view all files o View attacks o Encrypted files USER o Registration  Login  View and choose Data features
  • 9. NON-FUNCTIONAL REQUIREMENTS  Usability  Reliability  Performance  Security
  • 10. UML DIAGRAMS : : Data Server End User Browse File Encrypt File Send File Upload Response Store Encrypted Data asdfa View Attackers asdfa View Owner Files asdfa View Attackers asdfa Search for both SSED and K nearest neighbor search View ‘N’ Ranked Data Request data Data Owner Retrieve and store data Usecase diagram:
  • 11. Members Methods Methods Members Members Methods Members Methods Methods Members Browse File, Encrypt File , Upload File, View All, Exit, View_owner_Files Select File Name, Owner Name, Owner File Data Owner View all Owner Files, View Attacks,Store_Files,Authori ze_Files,Authorize users,Encrypted_Files File ID, File Name, Owner Name, Secret Key, User Details, File Access Details, View User Property, Hackers, Exit Data Server Login, Register, Reset User Name, Password Login Register, Reset Name, Password, DOB, Gender, Address, City, Country, Email, Mobile Register Search File Based_ On_ SSED and K nearest neighbor search, Exit, Register, and Login Fname,rank,usernam e,secret_key Receiver Class diagram :
  • 12. SEQUENCE DIAGRAM Browse & uploads file File sent confirmation Search response Search response Searching file for SPCHS and IBKEM Gives secret key Request secret key View all data provider files Data provider End userData server Checks file names & aggregate key Request SK Save files Download file Check files name and Secret key
  • 13. • Response Response Request Response Data Owner Upload Enc Files Data Server Response for both the techniques such as SSED and K nearest neighbor search with searching ratio End User Request Data by keyword Response data sent information Request Find the Data Set and upload data Data flow diagram
  • 14. Architecture Diagram Data Owner End User DATA SERVER 1) View user Details 2) View Attacker Details 3) Unblock User 1) Registers & Login 1) Registers & Logins Browse and enc and Uploads files with keywords, enc keyword also. 1) Searches for files based on Content’s keyword 2) Requests for Skey 3) Requests for downloading files 4) Find the file search ratio 5) Find all K Nearest Neighbor search documents
  • 16. IMPLEMENTATION :  Data provider  Data Server  END User
  • 17. DATA PROVIDER  In this module, the data provider uploads their data in the Data server. For the security purpose the data owner encrypts the data file and then store in the server. The Data owner can have capable of manipulating the encrypted data file.
  • 18. DATA SERVER  The Data server manages which is to provide data storage service for the Data Owners. Data owners encrypt their data files and store them in the Server for sharing with data consumers. To access the shared data files, data consumers download encrypted data files of their interest from the Server and then Server will decrypt them. The server will generate the aggregate key if the end user requests multiple files at the same time to access.
  • 19. END USER  In this module, the user can only access the data file with the encrypted key word. The user can search the file for both the methods such as SSED and K nearest neighbor search. The user has to register and then login from the Data server.
  • 28. CONCLUSION  To protect user privacy, various privacy-preserving classification techniques have been proposed over the past decade. The existing techniques are not applicable to outsourced database environments where the data resides in encrypted form on a third- party server.  This project proposed a novel privacy-preserving k- NN classification protocol over encrypted data in the server. This protocol protects the confidentiality of the data, user’s input query, and hides the data access patterns.