Secure Similarity Search on Outsourced Metric Data

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5

Abstract

Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the advantages, the cloud users have security concerns as the cloud server is considered “untrusted”. In this paper we propose and build a security mechanism that provides complete security to outsourced data. We considered a scenario where three parties are involved. They are cloud server, data owners and trusted clients. The data owners store and retrieve data. The cloud server is meant for storing outsourced data. The trusted client gets data of data owners from server by making NN queries. We built various techniques that help in secure storage retrieval and querying of outsourced data. When data is sent to cloud, it is transformed and encrypted before storing into server. This will be decrypted when queries are made by trusted clients. We built a prototype application that shows the usefulness of the proposed mechanism and the empirical results are encouraging.

Authors and Affiliations

P. Maruthi Rao , M. Gayatri

Keywords

Related Articles

Data Acquisition and Reduction Algorithm for Shearing Interferometer Based Long Trace Profilometer

The Long Trace Profilometer (LTP) is a non-contact optical profiling instrument, designed to measure the absolute surface figure to nanometer accuracy of long strip flat, spherical and aspherical X-ray optics of up to 12...

Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS

Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...

A Study of Local Binary Pattern Method for Facial Expression Detection

Face detection is a basic task for expression recognition. The reliability of face detection & face recognition approach has a major role on the performance and usability of the entire system. There are several ways...

WLan Architecture

It is the review paper of Architecture of Wireless local area networks. In this paper we are discussing the architecture of wlan. A wireless LAN (WLAN) is a local area network based on wireless technology. Most modern lo...

A Survey on Mobility Management Protocols for Improving Handover Performance

The wireless and mobile communication systems have enormous growth in recent years because many people use mobile devices for acquiring different services like browsing, multimedia applications and file sharing etc. Mobi...

Download PDF file
  • EP ID EP157311
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

P. Maruthi Rao, M. Gayatri (2013). Secure Similarity Search on Outsourced Metric Data. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(5), 264-268. https://europub.co.uk/articles/-A-157311