Privacy Preservation Schemes with Efficient Query Services within the Cloud  
  Authors : Gowri Shankar; N. Anand Reddy

 

Using the extensive implementation of public cloud computing infrastructures, making use of clouds in order to host data query services is becoming a desirable solution with the advantages on scalability as well as costsaving. Even so, some data could possibly be sensitive which the data owner will not need to proceed to the cloud unless the information confidentiality along with query privacy are guaranteed. Alternatively, a secured query service need to still provide efficient query processing as well as significantly slow up the in-house workload to totally realize the advantages of cloud computing. In this paper propose the particular RASP data perturbation technique to provide secure as well as efficient range query in addition to kNN query services of process as secure information within the cloud. The RASP information perturbation technique allows in order continuing encryption, dimensionality expanding upon, stochastic noise injection, because intimately while random projection, to bring about strong resilience appropriate to attacks within the perturbed information and queries. Additionally , it continues multidimensional ranges, that allows existent indexing comes on to implement to accelerate range query serving. The especial kNN-R algorithm are stimulated to attend to the RASP range query algorithm to process the kNN queries. We consume cautiously analyzed the plans of attack upon information and queries within an precisely defined threat model by with realistic security system assumptions. Considerable experiments have represented conducted to be able to show the benefits of this strategy on efficiency and also security.

 

Published In : IJCAT Journal Volume 2, Issue 10

Date of Publication : October 2015

Pages : 336 - 441

Figures :04

Tables : 01

Publication Link :Privacy Preservation Schemes with Efficient Query Services within the Cloud

 

 

 

Ashwini Sonkusale : Department of Information Technology, RTMNU, Nagpur, Maharashtra, India

Gowri Shankar : M.Tech 2nd year, Department of CSE, JNTUA, SEAT Tirupati, AP, India

N. Anand Reddy : Associate Professor, Department of CSE, JNTUA, SEAT Tirupati, AP, India

 

 

 

 

 

 

 

Cloud computing

Data storage

query processing

security

In this particular paper, we suggest the RASP perturbation scheme to hosting query services within the cloud, that satisfies the CPEL standards: information Confidentiality, query secrecy, cost-effective query processing, also while Low in-house workload. The especial requirement upon low in-house workload is really a critical feature to completely realize the advantages of cloud 15 computing, as well as efficient query processing is usually a key way of measuring the standard of query services. RASP perturbation is usually a unique composition of OPE, dimensionality expansion, random noise injection, as well as random projection, which supplies unique security measures. This aims in order to preserve the topology with on the queried range in the perturbed space, in addition to as appropriates to attain use by indices on reference to cost-effective range query processing.

 

 

 

 

 

 

 

 

 

[1] Agrawal, R., Kiernan, J., Srikant, R., and Xu,Y. Order preserving encryption for numeric data. In Proceedings of ACM SIGMOD Conference (2004). [2] Boneh, D., and Waters, B. Conjunctive, subset, and range queries on encrypted data. In the Theory of Cryptography Conference (TCC (2007), Springer, pp. 535–554. [3] Chen, K., and Liu, L. VISTA: Validating and refining clusters via visualization. Information Visualization 3, 4 (2004), 257–270. [4] Curtmola, R., Garay, J., Kamara, S., and Ostrovsky, R. Searchable symmetric encryption:improved definitions and efficient constructions. In ACM CCS (2006), pp. 79–88. [5] Xu, H., Guo, S., and Chen, K. Building confidential and efficient query services in the cloud with rasp data perturbation. IEEE Transactions on Knowledge and Data Engineering 26, 2 (2014).