Secure Similarity Search on Outsourced Metric Data
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the advantages, the cloud users have security concerns as the cloud server is considered “untrusted”. In this paper we propose and build a security mechanism that provides complete security to outsourced data. We considered a scenario where three parties are involved. They are cloud server, data owners and trusted clients. The data owners store and retrieve data. The cloud server is meant for storing outsourced data. The trusted client gets data of data owners from server by making NN queries. We built various techniques that help in secure storage retrieval and querying of outsourced data. When data is sent to cloud, it is transformed and encrypted before storing into server. This will be decrypted when queries are made by trusted clients. We built a prototype application that shows the usefulness of the proposed mechanism and the empirical results are encouraging.
Authors and Affiliations
P. Maruthi Rao , M. Gayatri
Improved Authentication and Integrity Verification in Wireless Sensor Networks
In an unprotected environment of Wireless Sensor Network, the authentication scheme for multicast secure communication has to be designed with limited usage of resources and computation. Wireless Sensor Network are diver...
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...
To Improve Data Security by Using Secure Data Transmission
The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Al...
Battery-Powered Mobile Computer using Denial of Service
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of...
Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud
The mobile phones grow to be an essential part of our everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next in...