Abstract
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. It allows users to learn data from various different levels or angles, categorize it and summarize the associations identified. Increasing data intensity in cloud may also need to improve scalability and stability. Sensitive data must be preserved securely on violating the environment. This research work presents to secure the queries and to retrieve data to the client in an efficient manner. In this proposed work, two schemes, random space perturbation (RASP) and Advanced Encryption Standard (AES) are used for the purpose of initialization and to encrypt the data. Finally, Dijkstra’s algorithm is applied to calculate the distance between the nearby objects in the database. Comparing to K-NN, Dijkstra’s algorithm provides exact results, so its performance is highly accurate. In order to decrease the computational cost inherent to process the encrypted data, consider the case of incrementally updating datasets in the entire progress.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xu H, Guo S, Chen K (2014) Building confidential and efficient query services in the cloud with RASP data perturbation. IEEE Trans Knowl Data Eng 26(2)
Amudhavel J, Vengattaraman T, Basha MSS, Dhavachelvan P (2010) Effective maintenance of replica in distributed network environment using DST. In: International conference on advances in recent technologies in communication and computing (ARTCom), vol 252, no 254, pp 16–17, Oct 2010. doi:10.1109/ARTCom.2010.97
Haixiang D, Jingjing T (2013) The improved shortest path algorithm and its application in campus geographic information system. J Convergence Inf Technol 8(2)
Raju R, Amudhavel J, Pavithra M, Anuja S, Abinaya B (2014) A heuristic fault tolerant MapReduce framework for minimizing make span in hybrid cloud environment. In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 4, pp 6–8, March 2014. doi:10.1109/ICGCCEE.2014.6922462
Bau J, Mitchell JC (2011) Security modeling and analysis. IEEE Secur Priv 9(3):18–25
Raju R, Amudhavel J, Kannan N, Monisha M (2014) A bio inspired energy-aware multi objective Chiropteran algorithm (EAMOCA) for hybrid cloud computing environment. In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 5, pp 6–8, Mar 2014. doi:10.1109/ICGCCEE.2014.6922463
Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge University Press, Cambridge
Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of IEEE INFOCOMM
Chen K, Kavuluru R, Guo S (2011) RASP: efficient multidimensional range query on attack-resilient encrypted databases. In: Proceedings of ACM conference data and application security and privacy, pp 249–260
Chen K, Liu L (2011) Geometric data perturbation for outsourced data mining. Knowl Inf Syst 29:657–695
Chen K, Liu L, Sun G (2007) Towards attack-resilient geometric data perturbation. In: Proceedings of SIAM international conference data mining
Chor B, Kushilevitz E, Goldreich O, Sudan M (1998) Private information retrieval. ACM Comput Surv 45(6):965–981
Raju R, Amudhavel J, Kannan N, Monisha M (2014) Interpretation and evaluation of various hybrid energy aware technologies in cloud computing environment—a detailed survey.In: International conference on Green Computing Communication and Electrical Engineering (ICGCCEE), vol 1, no 3, pp 6–8, Mar 2014. doi:10.1109/ICGCCEE.2014.6922432
Vengattaraman T, Abiramy S, Dhavachelvan P, Baskaran R (2011) An application perspective evaluation of multi-agent system in versatile environments. Int J Expert Syst Appl Elsevier 38(3):1405–1416
Venkatesan S, Dhavachelvan P, Chellapan C (2005) Performance analysis of mobile agent failure recovery in e-service applications. Int J Comput Stand Interfaces Elsevier 32(1–2):38–43. ISSN:0920-5489
Dhavachelvan P, Uma GV, Venkatachalapathy VSK (2006) A new approach in development of distributed framework for automated software testing using agents. Int J Knowl Based Syst Elsevier 19(4):235–247
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Thiyagarajan, B. et al. (2016). Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner. In: Suresh, L., Panigrahi, B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, vol 398. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2674-1_54
Download citation
DOI: https://doi.org/10.1007/978-81-322-2674-1_54
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2672-7
Online ISBN: 978-81-322-2674-1
eBook Packages: EngineeringEngineering (R0)