Building Trustworthy And Resourceful Interrogation Services In The Cloud Using Knn-R Algorithm
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Today’s , peoples are prevalently used cloud computing platform. In this platform user can save their outlay and time by using interrogation services in cloud info. In these info sometimes data owner does not transfer in to cloud, because information may be factotum from the malevolent users when they use in cloud if not the secure data and also secrecy of a interrogation is guaranteed. In cloud, to intensification the efficiency of interrogation processing and to save the workload of interrogation processing, it is necessary to provide secure interrogation service to user. To fully realize the benefits of cloud computing the workload must be reduced and resourceful interrogation processing must be provided. Therefore, to provide trustworthy and resourceful interrogation service RASP method is proposed, where RASP denotes Random Space Perturbation. Data Perturbation technique allows users to ascertain key summary information about the data that is not distorted and does not lead to a safe keeping breach. Exclusive safe keeping features are provided by the RASP. The RASP approach satisfies the data Trustworthyity, interrogation Secrecy, Resourceful interrogation processing and Low working outlay (CPEL) criteria for hosting queries in the cloud. KNN R algorithm is used here to process the Range interrogation to the kNN interrogation. The random space perturbation (RASP) data perturbation method to provide secure and resourceful range interrogation and kNN interrogation services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows prevailing indexing techniques to be applied to speedup range interrogation processing. The kNN R algorithm is designed to work with the RASP range interrogation algorithm to process the kNN queries.Key Words: interrogation services in the cloud, low in house processing, RASP perturbation, Range interrogation, KNN interrogation.
Authors and Affiliations
R Naga Sudha| Student of M.Tech (CSE) and Department of Computer Science Engineering, G Nirmala| Sr Asst.Prof, Department of Computer Science and Engineering, Sir C R Reddy College of Engineering, Eluru, W.G.DIST
Steganography with BSS-RSA-LSB technique: A new approach to Steganography
Security of information plays a vital role in data transmission. For this purpose steganography and cryptography is plays a major role. Steganography embed a text into cover image and cryptography convert plain text i...
Dynamic Performance Analysis of BLDC Motor with Adaptive Neuro Fuzzy Controller Under Critical Load Condition
Brushless DC (BLDC) motors have been widely used in many fields of drives for their high power/weight, high torque, high efficiency, long operating life, noiseless operation, high speed ranges and ease of control. In...
Real-Time Atomization Of Agricultural Environment For Social Modernization Of Indian Agricultural System
In the years since its independence, India has made immense progress towards food security. Indian population has tripled, but food-grain production more than quadrupled: there has been substantial increase in availa...
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...
A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users,...