Downloads: 108 | Views: 250
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.8 / 10
Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
V. Maruvoor Arasi, Carolene
Abstract: In recent days, the amount of information generated has grown fastly. With that large amount of information in addition to the complexity of the data, require refined management schemes that are ahead of the capabilities of many small businesses or persons. Over the past few years outsourcing spatial data has developed rapidly with the popularity of location-based services and the plentiful usage of smart phones and GPS enabled mechanisms. As a result, the outsourcing database paradigm is more and more all the rage that has received a lot of concentration in the research area. In this model the data owner (DO) entrusts the management and preservation of its database to a third-party service provider (SP) which is accountable for indexing the data and responding client queries from anywhere. In this work, proposes an effective method on the Outsourced Spatial Database (OSDB) model called VN which permits a client to authenticate the accuracy and unity of the result set based on user query. An interactive protocol between the server (Prover) and the querier (Verifier) that gives the concluding with zero-knowledge evidence that the Prover has a valid Condensed-RSA signature in line with the records in the query result set. The server returns to the querier the result set along with a witness. The querier then sends a random challenge to which the server responds with a valid response to the client. The reply among the witness induces the querier of servers knowledge of the Condensed-RSA signature, devoid of disclosing any information about the Condensed-RSA signature itself. Additionally, present the multisignature scheme that is provably secure devoid of random oracles where a single short object the multisignature can substituten signatures by n signers that all on the same message.
Keywords: Query Authentication, Spatial Queries, Outsourced Databases, Condensed-RSA Signature, Multi Signature Scheme, Voronoi Diagrams
Edition: Volume 3 Issue 9, September 2014
Pages: 1698 - 1704
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2258 - 2261A Survey on k-NN Classification over Semantically Secure Encrypted Relational
Mayadevi Kotlapure
Downloads: 116
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 709 - 711Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information
Pranali D. Desai, Vinod S. Wadne
Downloads: 125
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 437 - 440Protection of Private Data in Association Rule Mining
Ashwini B. Yadav, Vikas B. Maral
Downloads: 129
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 389 - 391KNN Classification of Encrypted Cloud Data with Privacy Preservation
Mayadevee Madhukar Kotlapure, L. J. Sankpal