Secure kNN Query Processing in Untrusted Cloud Environments

4,500.00

  • Check Mark Estimated Delivery : Up to 4 business days
  • Check Mark Free Shipping & Returns : On all orders over $200
  • Visa Card
  • MasterCard
  • American Express
  • Discover Card
  • PayPal
  • Apple Pay
Guaranteed Safe And Secure Checkout

Secure kNN Query Processing in Untrusted Cloud Environments

 

Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest (e.g., certain niche directions in arts, entertainment, travel) gather large amounts of geo-tagged data that appeal to subscribed users. Such data may be sensitive due to their contents. Furthermore, keeping such information up-to-date and relevant to the users is not an easy task, so the owners of such data sets will make the data accessible only to paying customers. Users send their current location as the query parameter, and wish to receive as result the nearest POIs, < Final Year Projects > i.e., nearest-neighbors (NNs). But typical data owners do not have the technical means to support processing queries on a large scale, so they outsource data storage and querying to a cloud service provider. Many such cloud providers exist who offer powerful storage and computational infrastructures at low cost. However, cloud providers are not fully trusted, and typically behave in an honest-but-curious fashion. Specifically, they follow the protocol to answer queries correctly, but they also collect the locations of the POIs and the subscribers for other purposes. Leakage of POI locations can lead to privacy breaches as well as financial losses to the data owners, for whom the POI data set is an important source of revenue. Disclosure of user locations leads to privacy violations and may deter subscribers from using the service altogether. In this paper, we propose a family of techniques that allow processing of NN queries in an untrusted outsourced environment, while at the same time protecting both the POI and querying users’ positions. Our techniques rely on mutable order preserving encoding (mOPE), the only secure order-preserving encryption method known to-date. We also provide performance optimizations to decrease the computational cost inherent to processing on encrypted data, and we consider the case of incrementally updating data sets. We present an extensive performance evaluation of our techniques to illustrate their viability in practice.

Open Lightbox

Video

View Demo

[numbers_sections number=”1″ title=”Including =Packages=” last=”no” ]

[/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]

[/numbers_sections] [numbers_sections number=”3″ title=”Support =Service=” last=”yes” ]

[/numbers_sections]

[one_third class=”” last=”no” ] [banner width=”0″ height=”92″ url=”#” target=”no” title=”CUSTOMER SUPPORT” subtitle=”Call us +91 967-778-1155″ title_size=”16″ title_size_hover=”10″ subtitle_size=”12″ subtitle_size_hover=”17″ icon_size=”38″ icon_size_hover=”52″ background=”” background_image=”” border=”#d0cece” color_icon=”#a1a1a1″ color_title=”#000000″ color_subtitle=”#666464″ background_hover=”#464646″ border_hover=”” color_icon_hover=”#f09d0c” color_title_hover=”#d0cece” color_subtitle_hover=”#fff” type=”switch-text” icon=”phone” style=”no” ] [/one_third] [one_third class=”” last=”no” ] [banner width=”0″ height=”92″ url=”/testimonial/” target=”no” title=”HAPPY CUSTOMERS” subtitle=”Read the testimonials” title_size=”16″ title_size_hover=”10″ subtitle_size=”12″ subtitle_size_hover=”17″ icon_size=”35″ icon_size_hover=”50″ background=”” background_image=”” border=”#d0cece” color_icon=”#a1a1a1″ color_title=”#000000″ color_subtitle=”#666464″ background_hover=”#464646″ border_hover=”” color_icon_hover=”#f09d0c” color_title_hover=”#d0cece” color_subtitle_hover=”#fff” type=”switch-text” icon=”comments-alt” style=”no” ] [/one_third] [one_third class=”” last=”yes” ] [banner width=”0″ height=”92″ url=”/blogs/” target=”no” title=”LATEST NEWS” subtitle=”enjoy our blog” title_size=”16″ title_size_hover=”10″ subtitle_size=”12″ subtitle_size_hover=”17″ icon_size=”35″ icon_size_hover=”50″ background=”” background_image=”” border=”#d0cece” color_icon=”#a1a1a1″ color_title=”#000000″ color_subtitle=”#666464″ background_hover=”#464646″ border_hover=”” color_icon_hover=”#f09d0c” color_title_hover=”#d0cece” color_subtitle_hover=”#fff” type=”switch-text” icon=”bullhorn” style=”no” ] [/one_third]

[space][clear]

[box_title ]Statistical Report[/box_title] [random_numbers icon=”/wp-content/uploads/2013/12/110.jpg” text=”satisfied customers” number=”3,589″ last=”no” ][random_numbers icon=”/wp-content/uploads/2013/12/25.jpg” text=”Freelance projects” number=”983″ last=”no” ][random_numbers icon=”/wp-content/uploads/2013/12/311.jpg” text=”sales on Site” number=”11,021″ last=”no” ][random_numbers icon=”/wp-content/uploads/2013/12/41.jpg” text=”developers” number=”175+” last=”yes” ] [space][clear]

ieee_final_year_projectsstudent_projectsieee_projects

Domains

Cloud Computing

Programming Language

Dotnet