Outsourced Data By Using Hamming Joins

Abstract

  certain properties) in an outsourced relational database framework with computational privacy and low overhead – a first, to the best of our knowledge. In an outsourced database framework, clients place data management responsibilities with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party without strong privacy assurances beyond policy “fine prints”. We experimentally evaluate the main overhead components and show they are reasonable. We illustrate via a set of r ele-vant instances of JOIN predicates, including: range and equality (e.g., for geographical data), Hamming distance (e.g., for DNA matching) and semantics (i.e., in health-care scenarios – m apping antibiotics to bacteria). The initial client computation overhead for 100000 data items is around 5 minutes and our privacy mechanisms can sustain theoretical throughputs of several million predicate evaluations per second, even for an un-optimized Open SSL based implementation.

Authors and Affiliations

Vijay J. Chaudhari

Keywords

Related Articles

EFFICIENT ACCESS CONTROL SECURITY ASSURANCE IN CLOUD COMPUTING USING BGKM WITH SHAMIR

Cloud computing relies on restricting discussing of resources to obtain coherence and financial systems of range, just like an application (like the power grid) over a network. The secure transmitting of details among w...

POWER QUALITY ENHANCEMENT USING 7 LEVEL CASCADED H - BRIDGE INVERTER BASED D - STATCOM WITH PQ THEOR Y

This paper presents an investigation of Seven - Level H – bridge Inverter is used in a Distribution Static Compensator (DSTATCOM) in Power System (PS), making use of seven level cascaded inverter benefits of low...

PLC-BASED SCHOOL AUTOMATION SYSTEM

In our day to day in school we observe that in school too much human effort is required to open and close the gate of school, ring the bell after every 1 hour,and tube lights and fans in the class are on even if there i...

 Detection of Logic Bombs

Computer viruses are big threat to computer world; researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining, system call arra...

 BUILDING ENERGY MANAGEMENT SYSTEM USING ISO 50001 STANDARD

 Neither energy can be created nor can be destroyed, so the main purpose of Building Energy Management Systems Software is to control the energy devices to make effective utilization of energy. All efforts are bein...

Download PDF file
  • EP ID EP95274
  • DOI -
  • Views 55
  • Downloads 0

How To Cite

Vijay J. Chaudhari (30).  Outsourced Data By Using Hamming Joins. International Journal of Engineering Sciences & Research Technology, 3(10), 212-216. https://europub.co.uk/articles/-A-95274