Đang chuẩn bị liên kết để tải về tài liệu:
Attribute based secure query processing in cloud with privacy homomorphism

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

A Privacy Homomorphism (PH) Technique is being used in the system to provide prominent security features to client. Here, PH emphasise to resolve the security of query processing from client side, cloud, with the kNN on R-tree index query and distance re-coding algorithm. PH technique support to leverage performance parameter in cloud computing. | International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 291–297 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Attribute Based Secure Query Processing in Cloud with Privacy Homomorphism Ms. RUPALI S.KHACHANE1 and Dr. PRADEEP K.DESHMUKH2 1, 2 Dept. of Computer Engineering, RajarshiShahu College of Engineering, Tathawde, Pune, India Affiliated To SavitribaiPhule Pune University E-mail: 1rupali.khachane@gmail.com, 2pkdeshmukh9@gmail.com ABSTRACT Different types of business organizations are benefitted due to convenient as well as secure working of Cloud Computing and Data Outsourcing. A cloud, data owner and client are intrinsic part of the system. Hence, secure query of users with privacy of data owners received a worldwide importance in modern days cloud computing and data management. A research had been carried out by many people in cloud computing and its security to preserve query processing data, privacy of data owners and its clients. A Privacy Homomorphism (PH) Technique is being used in the system to provide prominent security features to client. Here, PH emphasise to resolve the security of query processing from client side, cloud, with the kNN on R-tree index query and distance re-coding algorithm. PH technique support to leverage performance parameter in cloud computing. Keywords: Privacy Homomorphism, Encrypted data, Decryption Data, K-Nearest Neighbour, Cipher Text, Plaintext, Cloud Security. 1 INTRODUCTION In cloud computing, data owner use data and querying services for outsourcing on the cloud data. During this process, data is the separate and private asset of the data owner, hence that must be protected against cloud and querying client. Query which is fired by the client may disclose the sensitive details information of the client. Hence should be protected in cloud and from data owners. Therefore, one of the major problem in cloud computing is to protect both, .