Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Building Confidential & Efficient Query Services in the Cloud with RASP Perturbation

A Rebekah Johnson, N.Parashuram, Dr S.Prem Kumar, ,
Affiliations
(M.Tech), CSE
Assistant Professor, Department of Computer Science and Engineering
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
:NOT ASSIGNED


Abstract
In this paper Cloud computing infrastructures are popularly used by peoples now a days. By using cloud users can save their cost for query services. But some of the data owners are hesitate to put their data’s in cloud because, sometimes the data may be hack when they use in cloud unless the confidentiality of data and secure query processing will be provided by the cloud provider.However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. We propose the Random Space Encryption (RASP) approach that allows efficient range search with stronger attack resilience than existing efficiency-focused approaches. The random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random noise injection, and random projection, to provide strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional ranges, which allows existing indexing techniques to be applied to speedup range query processing. The kNN-R algorithm is designed to work with the RASP range query algorithm to process the kNN queries.


Citation
A Rebekah Johnson,N.Parashuram,Dr S.Prem Kumar."Building Confidential & Efficient Query Services in the Cloud with RASP Perturbation". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09,pp.627-630, SEPTEMBER - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I920.pdf,


Keywords : RASP Method, query services in the cloud, privacy, range query, kNN query.

References
[1] Xu, H., Guo, S., and Chen, K. ―Building confidential and efficient query services in the cloud with RASP data perturbation‖, IEEE Transactions on Knowledge and Data Engineering 26, 2 (2014). 
[2] K. Chen, R. Kavuluru, and S. Guo, ―RASP: Efficient Multidimensional Range Query on Attack-Resilient Encrypted Databases,‖ Proc. ACM Conf. Data and Application Security and Privacy, pp. 249-260, 2011. 
[3] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, ―Order Preserving Encryption for Numeric Data,‖ Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD), 2004.
 [4] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.K. Andy Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ―Above the Clouds: A Berkeley View of Cloud Computing,‖ technical report, Univ. of Berkerley, 2009. 
[5] J. Bau and J.C. Mitchell, ―Security Modeling and Analysis,‖ IEEE Security and Privacy, vol. 9, no. 3, pp. 18- 25, May/June 2011. 
[6]. M. L. Liu, G. Ghinita, C. S.Jensen, and P. Kalnis, ―Enabling search services on outsourced private spatial data,‖ The International Journal of on Very Large Data Base, vol. 19, no. 3, 2010. 
[7]. M. F. Mokbel, C. yin Chow, and W. G. Aref, ―The new casper: Query processing for location services without compromising privacy,‖ in Proceedings of Very Large Databases Conference (VLDB), 2006, pp. 763–774.
 [8]. M. Rudelson and R. Vershynin, ―Smallest singular value of a random rectangular matrix,‖ Communications on Pure and Applied Mathematics, vol. 62, pp. 1707–1739, 2009.
 [9] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, ―Secure ranked keyword search over encrypted cloud data,‖ in Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), 2010. 
[10]. E. Shi, J. Bethencourt, T.-H. H. Chan, D. Song, and A. Perrig, ―Multi-dimensional range query over encrypted data,‖ in IEEE Symposium on Security and Privacy, 2007. 
[11]. P. Williams, R. Sion, and B. Carbunar, Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage,‖ in ACM Conference on Computer and Communications Security, 2008.
 [12]. W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, ―Secure knn computation on encrypted databases,‖ in Proceedings of ACM SIGMOD Conference. New York, NY, USA: ACM, 2009, pp. 139–152.


DOI Link : NOT ASSIGNED

Download :
  V2I920.pdf


Refbacks : Currently there are no Refbacks

Support Us


We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to editorijcert@gmail.com