Submit Search
Upload
IRJET- Secure Skyline Queries over the Encrypted Data
•
0 likes
•
31 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5565.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
REU Group 2 - Paper
REU Group 2 - Paper
Scott Payne
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
IJERA Editor
Paper id 28201425
Paper id 28201425
IJRAT
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET Journal
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
M021201092098
M021201092098
theijes
Recommended
REU Group 2 - Paper
REU Group 2 - Paper
Scott Payne
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
IJERA Editor
Paper id 28201425
Paper id 28201425
IJRAT
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET Journal
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
M021201092098
M021201092098
theijes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
IEEEFINALYEARPROJECTS
Proactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate Polynomial
IJERA Editor
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
F42022628
F42022628
IJERA Editor
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
IRJET Journal
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
Ijcnc050208
Ijcnc050208
IJCNCJournal
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
hiij
Variable length key based visual
Variable length key based visual
csandit
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET Journal
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
More Related Content
What's hot
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
IEEEFINALYEARPROJECTS
Proactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate Polynomial
IJERA Editor
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
F42022628
F42022628
IJERA Editor
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
IRJET Journal
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
Ijcnc050208
Ijcnc050208
IJCNCJournal
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
hiij
Variable length key based visual
Variable length key based visual
csandit
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
What's hot
(19)
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Proactive Secret Sharing using a Trivariate Polynomial
Proactive Secret Sharing using a Trivariate Polynomial
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
F42022628
F42022628
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Image encryption using aes key expansion
Image encryption using aes key expansion
Ijcnc050208
Ijcnc050208
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
Variable length key based visual
Variable length key based visual
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Similar to IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET Journal
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
cscpconf
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
Similar to IRJET- Secure Skyline Queries over the Encrypted Data
(20)
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Ijariie1196
Ijariie1196
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Online banking management system project.pdf
Online banking management system project.pdf
Kamal Acharya
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
RagavanV2
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Christo Ananth
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
rknatarajan
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
result management system report for college project
result management system report for college project
Tonystark477637
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Recently uploaded
(20)
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Online banking management system project.pdf
Online banking management system project.pdf
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
result management system report for college project
result management system report for college project
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
IRJET- Secure Skyline Queries over the Encrypted Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4770 Secure Skyline Queries over the Encrypted Data Nimmy K R Student, Dept. of Computer Science Engineering, Thejus Engineering college, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Outsourcing data to cloudserverprovidesbetter usability of data. But to preserve the security and privacy these outsourced data need to be protected from the cloud server and other unauthorized users. The encryption of data can protect the data. For query processing, the skylinequeryis used and it is particularly importantfor multi-criteriadecision making. As a part of the work, the work can be categorized into four parts mainly. And they are Data Transformation, where data to be transformed into different form by performing RSA encryption and the noise appending process where random noise values are generated and appended to the data. Then comes the Auditing where it checks whether there is an occurrence of attack or not. Skyline Computations specifies the Secure Skyline computations over the encrypted data. And the Query retrieval which is to submitthequeryand should return the efficient result by performing various calculations such as skyline computations by TPA(Third Party Authority). Key Words: Skyline Query, Multi-criteria decision making, RSA Encryption, Auditing, Noise Appending, Skyline Computations, Query Retrieval etc ... 1.INTRODUCTION As an arising trend, most of the users uploads their datasets to the external clouds like Google cloud, AWS, IBM cloud etc…This outsourcing of information and computation to cloud server provides many benefits like value edges, time edges etc. However privacy problems are to be thought of. To preserve the security and privacy, these outsourced information have to be compelled to be encrypted. Figure 1 illustrates the case of secure query processing over encrypted information within the cloud. The data owner outsources encrypted data to the cloud server. The cloud server processes queries from the user on the encrypted data and returns the query result to the user. Throughout the query processing, the cloud server shouldn't gain any data concerning the informations, information patterns, query, and query result[1]. Figure 1: Secure similarity queries 1.1 Secure Skyline Query Here introduces the secure skyline queries on encrypted information, that is another kind of similarity search where similarity queries are queries that retrieve objects that are just like the query object. There are mainly three types of similarity queries and they are as follows[2]. Similarity range Similarity nearest-neighbour Similarity join And these skyline queries are for multi-criteria decision making. That is , if over one attributes are there and we have to be compelled to get results satisfyingall theattribute criteria, we will directly use skyline queries. 1.2 Organization The rest of the paper is organized as follows. Section two presents the related works. Section three introduces the background definitions and the problem definitions. The proposed methodology and its algorithms are introduced in section four. Finally in section five, concludes the paper. 2. RELEATED WORKS S. B¨orzs¨onyi et al.[4] extend database systems by a Skyline operation. This operation filters out a collection of attention grabbing points from a probably massive set of data points. A point is attention grabbing if it is not dominated by any other point. [5] has the challenge that the CSPs can't be absolutely trusted, which gives fakequeryresultsforvarious bad cases. [6] introduces the fully homomorphic encryption schemes that performs arbitrarycomputationson encrypted information however that is not sensible. [7] proposed a new encryption method called asymmetric scalar-product- preserving encryption. But the drawback is it is less secure since all users know the private key. [8] proposes the work on secure kNN queries over the encrypted database outsourced to a cloud. A user issues an encrypted query record to the cloud, and the cloud returns the k similar results to the user. but such methods has the drawback that relative weights should beknownearlieronlythenthesingle similarity metric can be computed. [1] proposes efficient skyline querying but the security is restricted since the keys used for encryptions are stored at c2 cloud server which is not secure. Decryption can be done after obtaining these keys from c2 when there is a communication possible with
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4771 c1 and c2. There are many other works which is based on kNN queries which is in the secure multi-party computation (SMC) setting [9] where the data is given between two parties who want to cooperatively find the answers without revealing to each other their sensitive data. [10] proposes private information retrieval (PIR) setting where the query is private but the information is public, which are different from our settings. 3. BACKGROUND DEFINITIONS AND PROBLEM DEFINITION In this section, first illustrates thevariousnotationsandthen the various definitions used in this paper and then discusses the problem definition. 3.1 Notations For references, a summary of notations is given in Table 1. Table 1: Notations and its details NOTATION DEFINITIONS P Dataset of n tuples q Query tuple of client pi[ j] The j th attribute of pi n Number of points in P m Number of dimensions Pk Public key Sk Secret key 3.2 Definitions Skyline : Given a dataset P = {p1,p2…..pn} in m dimensional space. Let Pa and pb denotes two different points in P and if pa dominates pb, then pa<=pb and for at least one j, pa[j]<pb[j] where j lies between 1 and m. The skyline points are the data points that are not dominated by any other data points in P. Dynamic Skyline Query : Given a dataset P = {p1,p2…..pn} and a query point q in m dimensional space. Let pa and pb denotes two different points in P, we saythatpa dynamically dominates pb with regard to the query point q, denoted by pa<pb, if for all j, |pa[j]-q[j]|<=|pb[j]-q[j]| andforatleastone j, |pa[j]-q[j]|<|pb[j]-q[j]|,wherepi[j]isthejthdimensionof pi and 1<=j<=m. The skyline points are the data points that are not dominated by any other data points in P[1]. 3.3 Problem Definitions Designing a skyline protocol over the encrypted data in cloud environment for multi-criteria decision making without learning any information about data. 4. PROPOSED METHODOGY Due to wide variety of methods in queryprocessing,some of the feasible ideas are integrated into a protocol along with some extra ideas for preserving better security. The project work is aimed to provide a comprehensive solution which combines privacy of data, proper storage of data and efficient query retrieval. Secureskyline queriesonencrypted data, which is another type of similarity search where similarity search is nothing but queries that retrieve objects that are similar to query object. Skyline queries are important for multi-criteria decision making. 4.1 System Architecture The Figure 2 illustrates the abstract system architecture of the secure skyline protocol. Skyline protocol illustrates the concept of skyline query which is useful for multi-criteria decision making. And the skyline queries retrieves efficient results on each search process. The architecture consists of mainly four modules and they are Data Owner, Client, TPA, Cloud servers such as C1 and C2. Data Owner is the one who encrypts and stores the data. TPA performs skyline computations as well as noise appending and stores several information on C1 and C2. The C1 contains noise added encrypted data and C2 contains the noise details. And TPA returns the skyline computation results after both skyline and noise appending computationstotheclientwhosubmits the query. Figure 2: System Architecture
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4772 4.2 System Functionalities A. Encryption Initially the data owner loads the dataset and encrypts the dataset using the RSA encryption algorithm. Then loads the encrypted data to cloud. B. Auditing Auditing checks whether there is an occurrence of attack or not. If data undergoes some attack, the auditing result will return false. Else if no attack is detected during the auditing, the auditing results return true. Skyline computations are performed only when the auditing result is true. That is no data is modified. C. Noise Appending Randomly generated noise values are appended to the data and appended noise values and its index locations where these noise values are appended are stored in the cloud server C2. These noise values are added to make data more secure, that is some sort of data transformation are performed so that no one can obtain the actual data. So the data privacy is strictly followed. D. Skyline computations The skyline computations are performed by the Third party Authority. And the skyline computations are performed based on the skyline computation algorithm which is discussed in section 4.3. 4.3 Algorithms The main algorithms used here are RSA algorithm and Skyline computation algorithm. A. RSA Algorithm RSA algorithm is asymmetric cryptography algorithm. Asymmetric trully means that it works on two totally different keys and they are Public Key and Private Key. As the name describes that the Public Key is shared among everyone and Private key is not shares among everyonethat is it was kept private. An example of asymmetric cryptography : 1. A user sends its public key to the server and requests for some information. 2. The server encrypts the information using client’s public key and sends the encrypted information. 3. User receives this information and decrypts it. Since this is asymmetric, nobody else except browser, the user can decrypt the data even if a third party has public key of browser[3]. B. Skyline Computation Algorithm Input : A dataset and a query Output: Skyline query results Steps :- 1. Compute values for each n tuples and m attributes using the equation 2. Find the attribute sum 3. Choose the tuple with smallest sumS(ti)as a skyline 4. Add corresponding tuple to the skyline pool 5. Delete those tuplesdominatedbymintuple 6. Delete min tuple from dataset 7. Return skyline pool 5. CONCLUSIONS The paper implements a method to achieve the following objectives, skyline queries for multi-criteria decision making, should obtain efficient results on each search, should be useful when a single aggregated distance metric with all dimensions is hard to define. So to achieve all these objectives, the paper proposes the Skyline queries over the encrypted data which particularly important for multi-criteria decision making. As a part of the work, the work can be categorized into four parts mainly. And they are Data Transformation, where data to be transformed into different form by performing RSA encryption and the noise appending process where random noise values are generated and appended to the data. And noise added data and noise details are stored in C1 and C2 respectively. Then comes the Auditing where it checks whether there is an occurrence of attack or not. Skyline Computations specifies the Secure Skyline computations over the encrypted data. And the Query retrieval which is to submit the query and should return the efficient result by performing various calculations such as skyline computations by TPA(Third Party Authority). REFERENCES [1] Liu, Jinfei, et al. "Secure and Efficient SkylineQuerieson Encrypted Data." IEEE Transactions on Knowledge and Data Engineering (2018). [2] https://en.wikipedia.org/wiki/Similarity_search [3] https://en.wikipedia.org/wiki/RSA_(cryptosystem) [4] Borzsony, Stephan, Donald Kossmann, and Konrad Stocker. "The skyline operator." Proceedings 17th international conference on data engineering. IEEE, 2001. [5] Chen, Wenxin, et al. "Secure outsourced skyline query processing via untrusted cloud service providers." IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 2016. jqjqjj pt ii
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4773 [6] Gentry, Craig. "Fully homomorphic encryption using ideal lattices." Stoc. Vol. 9. No. 2009. 2009. [7] Wong, Wai Kit, et al. "Secure kNN computation on encrypted databases." Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM, 2009. [8] Elmehdwi, Yousef, Bharath K. Samanthula, and Wei Jiang. "Secure k-nearest neighbor query over encrypted data in outsourced environments." 2014 IEEE 30th International Conference on Data Engineering. IEEE, 2014. [9] Y. Qi and M. J. Atallah. E_cient privacy-preserving k- nearest neighbor search. In ICDCS 2008. [10] S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. PVLDB, 2010. BIOGRAPHIES Nimmy K R is a master student in APJ Abdul Kalam Technological University, Kerala. Her research interest includes computer security, information security and Cloud security.
Download now