SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4770
Secure Skyline Queries over the Encrypted Data
Nimmy K R
Student, Dept. of Computer Science Engineering, Thejus Engineering college, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Outsourcing data to cloudserverprovidesbetter
usability of data. But to preserve the security and privacy
these outsourced data need to be protected from the cloud
server and other unauthorized users. The encryption of data
can protect the data. For query processing, the skylinequeryis
used and it is particularly importantfor multi-criteriadecision
making. As a part of the work, the work can be categorized
into four parts mainly. And they are Data Transformation,
where data to be transformed into different form by
performing RSA encryption and the noise appending process
where random noise values are generated and appended to
the data. Then comes the Auditing where it checks whether
there is an occurrence of attack or not. Skyline Computations
specifies the Secure Skyline computations over the encrypted
data. And the Query retrieval which is to submitthequeryand
should return the efficient result by performing various
calculations such as skyline computations by TPA(Third Party
Authority).
Key Words: Skyline Query, Multi-criteria decision
making, RSA Encryption, Auditing, Noise Appending,
Skyline Computations, Query Retrieval etc ...
1.INTRODUCTION
As an arising trend, most of the users uploads their datasets
to the external clouds like Google cloud, AWS, IBM cloud
etc…This outsourcing of information and computation to
cloud server provides many benefits like value edges, time
edges etc. However privacy problems are to be thought of.
To preserve the security and privacy, these outsourced
information have to be compelled to be encrypted. Figure 1
illustrates the case of secure query processing over
encrypted information within the cloud. The data owner
outsources encrypted data to the cloud server. The cloud
server processes queries from the user on the encrypted
data and returns the query result to the user. Throughout
the query processing, the cloud server shouldn't gain any
data concerning the informations, information patterns,
query, and query result[1].
Figure 1: Secure similarity queries
1.1 Secure Skyline Query
Here introduces the secure skyline queries on encrypted
information, that is another kind of similarity search where
similarity queries are queries that retrieve objects that are
just like the query object. There are mainly three types of
similarity queries and they are as follows[2].
 Similarity range
 Similarity nearest-neighbour
 Similarity join
And these skyline queries are for multi-criteria decision
making. That is , if over one attributes are there and we
have to be compelled to get results satisfyingall theattribute
criteria, we will directly use skyline queries.
1.2 Organization
The rest of the paper is organized as follows. Section two
presents the related works. Section three introduces the
background definitions and the problem definitions. The
proposed methodology and its algorithms are introduced in
section four. Finally in section five, concludes the paper.
2. RELEATED WORKS
S. B¨orzs¨onyi et al.[4] extend database systems by a Skyline
operation. This operation filters out a collection of attention
grabbing points from a probably massive set of data points.
A point is attention grabbing if it is not dominated by any
other point. [5] has the challenge that the CSPs can't be
absolutely trusted, which gives fakequeryresultsforvarious
bad cases. [6] introduces the fully homomorphic encryption
schemes that performs arbitrarycomputationson encrypted
information however that is not sensible. [7] proposed a
new encryption method called asymmetric scalar-product-
preserving encryption. But the drawback is it is less secure
since all users know the private key. [8] proposes the work
on secure kNN queries over the encrypted database
outsourced to a cloud. A user issues an encrypted query
record to the cloud, and the cloud returns the k similar
results to the user. but such methods has the drawback that
relative weights should beknownearlieronlythenthesingle
similarity metric can be computed. [1] proposes efficient
skyline querying but the security is restricted since the keys
used for encryptions are stored at c2 cloud server which is
not secure. Decryption can be done after obtaining these
keys from c2 when there is a communication possible with
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4771
c1 and c2. There are many other works which is based on
kNN queries which is in the secure multi-party computation
(SMC) setting [9] where the data is given between two
parties who want to cooperatively find the answers without
revealing to each other their sensitive data. [10] proposes
private information retrieval (PIR) setting where the query
is private but the information is public, which are different
from our settings.
3. BACKGROUND DEFINITIONS AND PROBLEM
DEFINITION
In this section, first illustrates thevariousnotationsandthen
the various definitions used in this paper and then discusses
the problem definition.
3.1 Notations
For references, a summary of notations is given in Table 1.
Table 1: Notations and its details
NOTATION DEFINITIONS
P Dataset of n tuples
q Query tuple of client
pi[ j]
The j
th
attribute of pi
n
Number of points in P
m
Number of dimensions
Pk
Public key
Sk
Secret key
3.2 Definitions
Skyline : Given a dataset P = {p1,p2…..pn} in m dimensional
space. Let Pa and pb denotes two different points in P and if
pa dominates pb, then pa<=pb and for at least one j,
pa[j]<pb[j] where j lies between 1 and m. The skyline points
are the data points that are not dominated by any other data
points in P.
Dynamic Skyline Query : Given a dataset P = {p1,p2…..pn}
and a query point q in m dimensional space. Let pa and pb
denotes two different points in P, we saythatpa dynamically
dominates pb with regard to the query point q, denoted by
pa<pb, if for all j, |pa[j]-q[j]|<=|pb[j]-q[j]| andforatleastone
j, |pa[j]-q[j]|<|pb[j]-q[j]|,wherepi[j]isthejthdimensionof pi
and 1<=j<=m. The skyline points are the data points that are
not dominated by any other data points in P[1].
3.3 Problem Definitions
Designing a skyline protocol over the encrypted data in
cloud environment for multi-criteria decision making
without learning any information about data.
4. PROPOSED METHODOGY
Due to wide variety of methods in queryprocessing,some of
the feasible ideas are integrated into a protocol along with
some extra ideas for preserving better security. The project
work is aimed to provide a comprehensive solution which
combines privacy of data, proper storage of data and
efficient query retrieval. Secureskyline queriesonencrypted
data, which is another type of similarity search where
similarity search is nothing but queries that retrieve objects
that are similar to query object. Skyline queries are
important for multi-criteria decision making.
4.1 System Architecture
The Figure 2 illustrates the abstract system architecture of
the secure skyline protocol. Skyline protocol illustrates the
concept of skyline query which is useful for multi-criteria
decision making. And the skyline queries retrieves efficient
results on each search process. The architecture consists of
mainly four modules and they are Data Owner, Client, TPA,
Cloud servers such as C1 and C2. Data Owner is the one who
encrypts and stores the data. TPA performs skyline
computations as well as noise appending and stores several
information on C1 and C2. The C1 contains noise added
encrypted data and C2 contains the noise details. And TPA
returns the skyline computation results after both skyline
and noise appending computationstotheclientwhosubmits
the query.
Figure 2: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4772
4.2 System Functionalities
A. Encryption
Initially the data owner loads the dataset and encrypts the
dataset using the RSA encryption algorithm. Then loads the
encrypted data to cloud.
B. Auditing
Auditing checks whether there is an occurrence of attack or
not. If data undergoes some attack, the auditing result will
return false. Else if no attack is detected during the auditing,
the auditing results return true. Skyline computations are
performed only when the auditing result is true. That is no
data is modified.
C. Noise Appending
Randomly generated noise values are appended to the data
and appended noise values and its index locations where
these noise values are appended are stored in the cloud
server C2. These noise values are added to make data more
secure, that is some sort of data transformation are
performed so that no one can obtain the actual data. So the
data privacy is strictly followed.
D. Skyline computations
The skyline computations are performed by the Third party
Authority. And the skyline computations are performed
based on the skyline computation algorithm which is
discussed in section 4.3.
4.3 Algorithms
The main algorithms used here are RSA algorithm and
Skyline computation algorithm.
A. RSA Algorithm
RSA algorithm is asymmetric cryptography algorithm.
Asymmetric trully means that it works on two totally
different keys and they are Public Key and Private Key. As
the name describes that the Public Key is shared among
everyone and Private key is not shares among everyonethat
is it was kept private.
An example of asymmetric cryptography :
1. A user sends its public key to the server and
requests for some information.
2. The server encrypts the information using client’s
public key and sends the encrypted information.
3. User receives this information and decrypts it.
Since this is asymmetric, nobody else except browser, the
user can decrypt the data even if a third party has public key
of browser[3].
B. Skyline Computation Algorithm
Input : A dataset and a query
Output: Skyline query results
Steps :-
1. Compute values for each n tuples and m
attributes using the equation
2. Find the attribute sum
3. Choose the tuple with smallest sumS(ti)as
a skyline
4. Add corresponding tuple to the skyline
pool
5. Delete those tuplesdominatedbymintuple
6. Delete min tuple from dataset
7. Return skyline pool
5. CONCLUSIONS
The paper implements a method to achieve the following
objectives, skyline queries for multi-criteria decision
making, should obtain efficient results on each search,
should be useful when a single aggregated distance metric
with all dimensions is hard to define. So to achieve all these
objectives, the paper proposes the Skyline queries over the
encrypted data which particularly important for multi-criteria
decision making. As a part of the work, the work can be
categorized into four parts mainly. And they are Data
Transformation, where data to be transformed into different
form by performing RSA encryption and the noise appending
process where random noise values are generated and appended
to the data. And noise added data and noise details are stored in
C1 and C2 respectively. Then comes the Auditing where it
checks whether there is an occurrence of attack or not. Skyline
Computations specifies the Secure Skyline computations over
the encrypted data. And the Query retrieval which is to submit
the query and should return the efficient result by performing
various calculations such as skyline computations by TPA(Third
Party Authority).
REFERENCES
[1] Liu, Jinfei, et al. "Secure and Efficient SkylineQuerieson
Encrypted Data." IEEE Transactions on Knowledge and
Data Engineering (2018).
[2] https://en.wikipedia.org/wiki/Similarity_search
[3] https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[4] Borzsony, Stephan, Donald Kossmann, and Konrad
Stocker. "The skyline operator." Proceedings 17th
international conference on data engineering. IEEE,
2001.
[5] Chen, Wenxin, et al. "Secure outsourced skyline query
processing via untrusted cloud service providers." IEEE
INFOCOM 2016-The 35th Annual IEEE International
Conference on Computer Communications. IEEE, 2016.
       jqjqjj pt ii

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4773
[6] Gentry, Craig. "Fully homomorphic encryption using
ideal lattices." Stoc. Vol. 9. No. 2009. 2009.
[7] Wong, Wai Kit, et al. "Secure kNN computation on
encrypted databases." Proceedings of the 2009 ACM
SIGMOD International Conference on Management of
data. ACM, 2009.
[8] Elmehdwi, Yousef, Bharath K. Samanthula, and Wei
Jiang. "Secure k-nearest neighbor query over encrypted
data in outsourced environments." 2014 IEEE 30th
International Conference on Data Engineering. IEEE,
2014.
[9] Y. Qi and M. J. Atallah. E_cient privacy-preserving k-
nearest neighbor search. In ICDCS 2008.
[10] S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest
neighbor search with strong location privacy. PVLDB,
2010.
BIOGRAPHIES
Nimmy K R is a master student in
APJ Abdul Kalam Technological
University, Kerala. Her research
interest includes computer
security, information security and
Cloud security.

More Related Content

What's hot

IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
 
Proactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate PolynomialProactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate PolynomialIJERA Editor
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...JPINFOTECH JAYAPRAKASH
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Editor IJARCET
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...IRJET Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 

What's hot (19)

IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Proactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate PolynomialProactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate Polynomial
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
 
F42022628
F42022628F42022628
F42022628
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 

Similar to IRJET- Secure Skyline Queries over the Encrypted Data

IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET Journal
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 

Similar to IRJET- Secure Skyline Queries over the Encrypted Data (20)

IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

IRJET- Secure Skyline Queries over the Encrypted Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4770 Secure Skyline Queries over the Encrypted Data Nimmy K R Student, Dept. of Computer Science Engineering, Thejus Engineering college, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Outsourcing data to cloudserverprovidesbetter usability of data. But to preserve the security and privacy these outsourced data need to be protected from the cloud server and other unauthorized users. The encryption of data can protect the data. For query processing, the skylinequeryis used and it is particularly importantfor multi-criteriadecision making. As a part of the work, the work can be categorized into four parts mainly. And they are Data Transformation, where data to be transformed into different form by performing RSA encryption and the noise appending process where random noise values are generated and appended to the data. Then comes the Auditing where it checks whether there is an occurrence of attack or not. Skyline Computations specifies the Secure Skyline computations over the encrypted data. And the Query retrieval which is to submitthequeryand should return the efficient result by performing various calculations such as skyline computations by TPA(Third Party Authority). Key Words: Skyline Query, Multi-criteria decision making, RSA Encryption, Auditing, Noise Appending, Skyline Computations, Query Retrieval etc ... 1.INTRODUCTION As an arising trend, most of the users uploads their datasets to the external clouds like Google cloud, AWS, IBM cloud etc…This outsourcing of information and computation to cloud server provides many benefits like value edges, time edges etc. However privacy problems are to be thought of. To preserve the security and privacy, these outsourced information have to be compelled to be encrypted. Figure 1 illustrates the case of secure query processing over encrypted information within the cloud. The data owner outsources encrypted data to the cloud server. The cloud server processes queries from the user on the encrypted data and returns the query result to the user. Throughout the query processing, the cloud server shouldn't gain any data concerning the informations, information patterns, query, and query result[1]. Figure 1: Secure similarity queries 1.1 Secure Skyline Query Here introduces the secure skyline queries on encrypted information, that is another kind of similarity search where similarity queries are queries that retrieve objects that are just like the query object. There are mainly three types of similarity queries and they are as follows[2].  Similarity range  Similarity nearest-neighbour  Similarity join And these skyline queries are for multi-criteria decision making. That is , if over one attributes are there and we have to be compelled to get results satisfyingall theattribute criteria, we will directly use skyline queries. 1.2 Organization The rest of the paper is organized as follows. Section two presents the related works. Section three introduces the background definitions and the problem definitions. The proposed methodology and its algorithms are introduced in section four. Finally in section five, concludes the paper. 2. RELEATED WORKS S. B¨orzs¨onyi et al.[4] extend database systems by a Skyline operation. This operation filters out a collection of attention grabbing points from a probably massive set of data points. A point is attention grabbing if it is not dominated by any other point. [5] has the challenge that the CSPs can't be absolutely trusted, which gives fakequeryresultsforvarious bad cases. [6] introduces the fully homomorphic encryption schemes that performs arbitrarycomputationson encrypted information however that is not sensible. [7] proposed a new encryption method called asymmetric scalar-product- preserving encryption. But the drawback is it is less secure since all users know the private key. [8] proposes the work on secure kNN queries over the encrypted database outsourced to a cloud. A user issues an encrypted query record to the cloud, and the cloud returns the k similar results to the user. but such methods has the drawback that relative weights should beknownearlieronlythenthesingle similarity metric can be computed. [1] proposes efficient skyline querying but the security is restricted since the keys used for encryptions are stored at c2 cloud server which is not secure. Decryption can be done after obtaining these keys from c2 when there is a communication possible with
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4771 c1 and c2. There are many other works which is based on kNN queries which is in the secure multi-party computation (SMC) setting [9] where the data is given between two parties who want to cooperatively find the answers without revealing to each other their sensitive data. [10] proposes private information retrieval (PIR) setting where the query is private but the information is public, which are different from our settings. 3. BACKGROUND DEFINITIONS AND PROBLEM DEFINITION In this section, first illustrates thevariousnotationsandthen the various definitions used in this paper and then discusses the problem definition. 3.1 Notations For references, a summary of notations is given in Table 1. Table 1: Notations and its details NOTATION DEFINITIONS P Dataset of n tuples q Query tuple of client pi[ j] The j th attribute of pi n Number of points in P m Number of dimensions Pk Public key Sk Secret key 3.2 Definitions Skyline : Given a dataset P = {p1,p2…..pn} in m dimensional space. Let Pa and pb denotes two different points in P and if pa dominates pb, then pa<=pb and for at least one j, pa[j]<pb[j] where j lies between 1 and m. The skyline points are the data points that are not dominated by any other data points in P. Dynamic Skyline Query : Given a dataset P = {p1,p2…..pn} and a query point q in m dimensional space. Let pa and pb denotes two different points in P, we saythatpa dynamically dominates pb with regard to the query point q, denoted by pa<pb, if for all j, |pa[j]-q[j]|<=|pb[j]-q[j]| andforatleastone j, |pa[j]-q[j]|<|pb[j]-q[j]|,wherepi[j]isthejthdimensionof pi and 1<=j<=m. The skyline points are the data points that are not dominated by any other data points in P[1]. 3.3 Problem Definitions Designing a skyline protocol over the encrypted data in cloud environment for multi-criteria decision making without learning any information about data. 4. PROPOSED METHODOGY Due to wide variety of methods in queryprocessing,some of the feasible ideas are integrated into a protocol along with some extra ideas for preserving better security. The project work is aimed to provide a comprehensive solution which combines privacy of data, proper storage of data and efficient query retrieval. Secureskyline queriesonencrypted data, which is another type of similarity search where similarity search is nothing but queries that retrieve objects that are similar to query object. Skyline queries are important for multi-criteria decision making. 4.1 System Architecture The Figure 2 illustrates the abstract system architecture of the secure skyline protocol. Skyline protocol illustrates the concept of skyline query which is useful for multi-criteria decision making. And the skyline queries retrieves efficient results on each search process. The architecture consists of mainly four modules and they are Data Owner, Client, TPA, Cloud servers such as C1 and C2. Data Owner is the one who encrypts and stores the data. TPA performs skyline computations as well as noise appending and stores several information on C1 and C2. The C1 contains noise added encrypted data and C2 contains the noise details. And TPA returns the skyline computation results after both skyline and noise appending computationstotheclientwhosubmits the query. Figure 2: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4772 4.2 System Functionalities A. Encryption Initially the data owner loads the dataset and encrypts the dataset using the RSA encryption algorithm. Then loads the encrypted data to cloud. B. Auditing Auditing checks whether there is an occurrence of attack or not. If data undergoes some attack, the auditing result will return false. Else if no attack is detected during the auditing, the auditing results return true. Skyline computations are performed only when the auditing result is true. That is no data is modified. C. Noise Appending Randomly generated noise values are appended to the data and appended noise values and its index locations where these noise values are appended are stored in the cloud server C2. These noise values are added to make data more secure, that is some sort of data transformation are performed so that no one can obtain the actual data. So the data privacy is strictly followed. D. Skyline computations The skyline computations are performed by the Third party Authority. And the skyline computations are performed based on the skyline computation algorithm which is discussed in section 4.3. 4.3 Algorithms The main algorithms used here are RSA algorithm and Skyline computation algorithm. A. RSA Algorithm RSA algorithm is asymmetric cryptography algorithm. Asymmetric trully means that it works on two totally different keys and they are Public Key and Private Key. As the name describes that the Public Key is shared among everyone and Private key is not shares among everyonethat is it was kept private. An example of asymmetric cryptography : 1. A user sends its public key to the server and requests for some information. 2. The server encrypts the information using client’s public key and sends the encrypted information. 3. User receives this information and decrypts it. Since this is asymmetric, nobody else except browser, the user can decrypt the data even if a third party has public key of browser[3]. B. Skyline Computation Algorithm Input : A dataset and a query Output: Skyline query results Steps :- 1. Compute values for each n tuples and m attributes using the equation 2. Find the attribute sum 3. Choose the tuple with smallest sumS(ti)as a skyline 4. Add corresponding tuple to the skyline pool 5. Delete those tuplesdominatedbymintuple 6. Delete min tuple from dataset 7. Return skyline pool 5. CONCLUSIONS The paper implements a method to achieve the following objectives, skyline queries for multi-criteria decision making, should obtain efficient results on each search, should be useful when a single aggregated distance metric with all dimensions is hard to define. So to achieve all these objectives, the paper proposes the Skyline queries over the encrypted data which particularly important for multi-criteria decision making. As a part of the work, the work can be categorized into four parts mainly. And they are Data Transformation, where data to be transformed into different form by performing RSA encryption and the noise appending process where random noise values are generated and appended to the data. And noise added data and noise details are stored in C1 and C2 respectively. Then comes the Auditing where it checks whether there is an occurrence of attack or not. Skyline Computations specifies the Secure Skyline computations over the encrypted data. And the Query retrieval which is to submit the query and should return the efficient result by performing various calculations such as skyline computations by TPA(Third Party Authority). REFERENCES [1] Liu, Jinfei, et al. "Secure and Efficient SkylineQuerieson Encrypted Data." IEEE Transactions on Knowledge and Data Engineering (2018). [2] https://en.wikipedia.org/wiki/Similarity_search [3] https://en.wikipedia.org/wiki/RSA_(cryptosystem) [4] Borzsony, Stephan, Donald Kossmann, and Konrad Stocker. "The skyline operator." Proceedings 17th international conference on data engineering. IEEE, 2001. [5] Chen, Wenxin, et al. "Secure outsourced skyline query processing via untrusted cloud service providers." IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 2016.        jqjqjj pt ii 
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4773 [6] Gentry, Craig. "Fully homomorphic encryption using ideal lattices." Stoc. Vol. 9. No. 2009. 2009. [7] Wong, Wai Kit, et al. "Secure kNN computation on encrypted databases." Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM, 2009. [8] Elmehdwi, Yousef, Bharath K. Samanthula, and Wei Jiang. "Secure k-nearest neighbor query over encrypted data in outsourced environments." 2014 IEEE 30th International Conference on Data Engineering. IEEE, 2014. [9] Y. Qi and M. J. Atallah. E_cient privacy-preserving k- nearest neighbor search. In ICDCS 2008. [10] S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. PVLDB, 2010. BIOGRAPHIES Nimmy K R is a master student in APJ Abdul Kalam Technological University, Kerala. Her research interest includes computer security, information security and Cloud security.