Downloads: 111 | Views: 334
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.2 / 10
Secure Query Processing of Outsourced Data Using Privacy Homomorphism: kNN and Distance Decoding Algorithm
Rupali S. Khachane
Abstract: Cloud computing and data outsourcing helps with more convenient ways of working to different types of business enterprises. There is cloud, data owner and customers/clients. Query of data users and privacy of the data owners are most importance part of modern days cloud computing and data management. From long time lot of people researched on cloud computing and cloud security because query processing preserves data privacy of the data owners as well as clients. To provide more security features a PH technique is used. Privacy Homomorphism (PH) is emphasizes to resolve the privacy of query processing from client side and cloud with the kNN on R-tree index query and distance re-coding algorithm. PH leverages performance of cloud computing
Keywords: Privacy homomorphisms, Encrypted data processing, Decryption, privacy preserving process
Edition: Volume 3 Issue 12, December 2014
Pages: 1215 - 1219
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar