Skip to main content

Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner

  • Conference paper
  • First Online:
Proceedings of the International Conference on Soft Computing Systems

Abstract

Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. It allows users to learn data from various different levels or angles, categorize it and summarize the associations identified. Increasing data intensity in cloud may also need to improve scalability and stability. Sensitive data must be preserved securely on violating the environment. This research work presents to secure the queries and to retrieve data to the client in an efficient manner. In this proposed work, two schemes, random space perturbation (RASP) and Advanced Encryption Standard (AES) are used for the purpose of initialization and to encrypt the data. Finally, Dijkstra’s algorithm is applied to calculate the distance between the nearby objects in the database. Comparing to K-NN, Dijkstra’s algorithm provides exact results, so its performance is highly accurate. In order to decrease the computational cost inherent to process the encrypted data, consider the case of incrementally updating datasets in the entire progress.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu H, Guo S, Chen K (2014) Building confidential and efficient query services in the cloud with RASP data perturbation. IEEE Trans Knowl Data Eng 26(2)

    Google Scholar 

  2. Amudhavel J, Vengattaraman T, Basha MSS, Dhavachelvan P (2010) Effective maintenance of replica in distributed network environment using DST. In: International conference on advances in recent technologies in communication and computing (ARTCom), vol 252, no 254, pp 16–17, Oct 2010. doi:10.1109/ARTCom.2010.97

  3. Haixiang D, Jingjing T (2013) The improved shortest path algorithm and its application in campus geographic information system. J Convergence Inf Technol 8(2)

    Google Scholar 

  4. Raju R, Amudhavel J, Pavithra M, Anuja S, Abinaya B (2014) A heuristic fault tolerant MapReduce framework for minimizing make span in hybrid cloud environment. In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 4, pp 6–8, March 2014. doi:10.1109/ICGCCEE.2014.6922462

  5. Bau J, Mitchell JC (2011) Security modeling and analysis. IEEE Secur Priv 9(3):18–25

    Article  Google Scholar 

  6. Raju R, Amudhavel J, Kannan N, Monisha M (2014) A bio inspired energy-aware multi objective Chiropteran algorithm (EAMOCA) for hybrid cloud computing environment. In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 5, pp 6–8, Mar 2014. doi:10.1109/ICGCCEE.2014.6922463

  7. Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  8. Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of IEEE INFOCOMM

    Google Scholar 

  9. Chen K, Kavuluru R, Guo S (2011) RASP: efficient multidimensional range query on attack-resilient encrypted databases. In: Proceedings of ACM conference data and application security and privacy, pp 249–260

    Google Scholar 

  10. Chen K, Liu L (2011) Geometric data perturbation for outsourced data mining. Knowl Inf Syst 29:657–695

    Article  Google Scholar 

  11. Chen K, Liu L, Sun G (2007) Towards attack-resilient geometric data perturbation. In: Proceedings of SIAM international conference data mining

    Google Scholar 

  12. Chor B, Kushilevitz E, Goldreich O, Sudan M (1998) Private information retrieval. ACM Comput Surv 45(6):965–981

    MathSciNet  MATH  Google Scholar 

  13. Raju R, Amudhavel J, Kannan N, Monisha M (2014) Interpretation and evaluation of various hybrid energy aware technologies in cloud computing environment—a detailed survey.In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 3, pp 6–8, Mar 2014. doi:10.1109/ICGCCEE.2014.6922432

  14. Vengattaraman T, Abiramy S, Dhavachelvan P, Baskaran R (2011) An application perspective evaluation of multi-agent system in versatile environments. Int J Expert Syst Appl Elsevier 38(3):1405–1416

    Article  Google Scholar 

  15. Venkatesan S, Dhavachelvan P, Chellapan C (2005) Performance analysis of mobile agent failure recovery in e-service applications. Int J Comput Stand Interfaces Elsevier 32(1–2):38–43. ISSN:0920-5489

    Google Scholar 

  16. Dhavachelvan P, Uma GV, Venkatachalapathy VSK (2006) A new approach in development of distributed framework for automated software testing using agents. Int J Knowl Based Syst Elsevier 19(4):235–247

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Thiyagarajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Thiyagarajan, B. et al. (2016). Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_54

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2674-1_54

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2672-7

  • Online ISBN: 978-81-322-2674-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics