Secure kNN Query Processing using VD-kNN In an Untrusted Cloud Enviroments

  • Miss. Monika D Rokade University of Pune
  • Prof. Sandip A Kahate
Keywords: Query Services, kNN query, Structural database, Mutable order preserving encodinng

Abstract

At the moment, data is stored with a third party in cloud environments and query processing is also done by third party to reduce the amount to maintain the system. Mobile devices with geo-positioning capabilities register users to access information that is applicable to their present and current location. Users are interested in querying about points of interest (POI) in their physical concurrence. e.g. restaurants, cafes, gas station, etc. Objects specialized in various areas of interest (e.g., entertainment, and travel) gather large amounts of geotagged data that appeal to register users. Such data may be observant due to their substance. Furthermore, keeping such information latest form and applicable to the users is not an easy task , so the holder of such datasets will make the data available only to paying customers. Users send their current location as the query parameter and wish to receive as result the nearest POIs, i.e., nearest-neighbors (NNs). Keywords —Query services; kNN query; structural databases; mutable order preserving encoding.

References

[1] Sunoh Choi,Gabriel Ghinita.,"Secure kNN Query Processing in Untrusted Cloud Enviroments.",IEEE PP,14 [2] Mark de Berg et.al., Computational Geometry, Springer [3] W. K. Wong, David W. Cheung, Ben Kao, and Nikos Mamoulis, "Secure Knn Computation on Encrypted Databases.", SIGMOD'09" [4] Haibo Hu, Jianliang Xu, Chushi Ren, and Byron Choi, "Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism", ICDE'11 [5] Huiqi Xu, Shumin Guo, and Keke Chen,"Building Con_dential and E_cient Query Services in the Cloud with RASP Data Perturbation", TKDE'12 [6] Raluca Ada Popa, Frank H. Li, and Nickolai Zeldovich, "An Ideal-Security Protocol for Order-Preserving Encoding.", IEEE SP'13 [7] Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, and Elisa Bertino," A Hybrid Technique for Private Location- Based Queries with Database Protection", SSTD'09 [8] Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, and Elisa Bertino, "Approxi- mate and exact hybrid algorithms for private nearestneighbor queries with database protection.", Geoinformatica'11 [9] Ali Khoshgozaran and Cyrus Shahabi, "Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy., SSTD'07 [10] A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order Preserving Symmetric Encryption", EuroCrypt'09 [11] Jon Louis Bentley, "Multidimensional Binary Search Trees used for Associative Searching.", ACM Communications,1975 [12] Kalnis P., Ghinita G., Mouratidis K., and Papadias D., "Preserving location-based identity inference in anonymous spatial queries.,TKDE'07 28 [13] R. Agrawal, J. Kiernan. R. Srikant, and Y. Xu, "Order preserving encryption for numeric data., SIGMOD'04 [14] Der-Tsai Lee, "On k-Nearest Neighbor Voronoi Diagrams in the Plane.", IEEE Transactions on Computers, 1982 [15] Pankaj K. Agarwal, Mark De Berg, Jiri Matousek, and Otfried Schwarzkopf, "Constructing Levels in Arrangements and Higher Order Voronoi Diagrams", SIAM J.COMPUT. 1998
Published
2017-12-17
How to Cite
Rokade, M. M., & Kahate, P. S. (2017). Secure kNN Query Processing using VD-kNN In an Untrusted Cloud Enviroments. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/85
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.