A Novel Approach to Build Reliable and Efficient Query Services in Cloud with RASP Data Perturbation
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Inspired and motivated by the widespread development and deployment of public cloud computing infrastructures, using clouds to host data query services has become an fascinating solution for the advantages on scalability and cost-saving. However, Data owners show reluctance to share the sensitive and confidential data unless the Data integrity is guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows existing indexing techniques to be applied to speedup range query processing. The kNN-R algorithm is designed to work with the RASP range query algorithm to process the kNN queries. We have carefully analyzed the attacks on data and queries under a precisely defined threat model and realistic security assumptions. Extensive experiments have been conducted to show the advantages of this approach on efficiency and security.
Authors and Affiliations
Mohammad Junaid| M.Tech (CSE), Nimra College of Engineering and Technology, A.P., India, V. Padmaja| Asst. Professor, Dept. of Computer Science & Engineering, Nimra College of Engineering and Technology, A.P., India
Key-Aggregate Model Search for Group Data Sharing Using PatientControlled Encryption In Cloud
Cloud storage has risen as a promising tackling an issue for giving universal, helpful, and onrequest gets to a lot of information shared over the Internet. Specifically, our plans give the main open key patient-contr...
A High Speed Vedic Multiplier Using Different Compressors
A digital clock rate multiplier, divisor using variable point math which generates the output clock with almost zero occurrence error has been presented. The circuit has an uncontrolled multiplication and division fac...
Concurrent and independent operations to the remote encrypted cloud database from many geographically distributed clients
since data in cloud will be placed anywhere, because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not h...
An Exploration Approach To Progress The Rank Privacy In Data Collection
A hierarchical clustering strategy is proposed to bolster more pursuit semantics and furthermore to take care of the demand for quick ciphertext seek inside a major information condition. The proposed various hierarc...
The Evolution of Microprocessor Chip: A historic overview of development
In this paper we aredescribing the more interesting segments like, external structure of microprocessor chip(the birth of microprocessor) from silicon element becausemost of IT student does not have knowledge about t...