A Novel Approach to Build Reliable and Efficient Query Services in Cloud with RASP Data Perturbation
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Inspired and motivated by the widespread development and deployment of public cloud computing infrastructures, using clouds to host data query services has become an fascinating solution for the advantages on scalability and cost-saving. However, Data owners show reluctance to share the sensitive and confidential data unless the Data integrity is guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows existing indexing techniques to be applied to speedup range query processing. The kNN-R algorithm is designed to work with the RASP range query algorithm to process the kNN queries. We have carefully analyzed the attacks on data and queries under a precisely defined threat model and realistic security assumptions. Extensive experiments have been conducted to show the advantages of this approach on efficiency and security.
Authors and Affiliations
Mohammad Junaid| M.Tech (CSE), Nimra College of Engineering and Technology, A.P., India, V. Padmaja| Asst. Professor, Dept. of Computer Science & Engineering, Nimra College of Engineering and Technology, A.P., India
Web Based Fault Detection System
Embedded systems became an important part of our life. Addressing functional safety is a major challenge with increasing complexity. Typical examples of safety-critical embedded systems include vehicle safety or drive...
Interpreting Pursuit Outcomes from Data Web Bases
The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexib...
Power Quality Enhancement of Grid interconnected wind energy system with 4-Leg Inverter
At present the Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This paper presents a novel control strategy for achieving maximum benef...
Role of Cloud Computing in Health Monitoring System
Patient care is the focus of many clinical disciplines application but it is very complex as patient care is the essential information for direct patient care is defined on the applications. The present applications...
Success Pattern Finding With Regards To Textual Content Exploration
The success pattern is mainly concentrated on Object Rank and PageRank, the latter created by Larry Page and used in msn Search Engine, were heavy costly as they required a PageRank style iterative computation over t...