International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Data Mining has wide use in many fields such as financial, medication, medical research and among govt. departments. Classification is one of the widely applied works in data mining applications. For the past several years, due to the increase of various privacy problems, many conceptual and realistic alternatives to the classification issue have been suggested under various protection designs. On the other hand, with the latest reputation of cloud processing, users now have to be able to delegate their data, in encoded form, as well as the information mining task to the cloud. Considering that the information on the cloud is in secured type, current privacy-preserving classification methods are not appropriate. In this paper, we concentrate on fixing the classification issue over encoded data. In specific, we recommend a protected k-NN classifier over secured data in the cloud. The suggested protocol defends the privacy of information, comfort of user-s feedback query, and conceals the information access styles. To the best of our information, our task is the first to create a protected k-NN classifier over secured data under the semi-honest model. Also, we empirically evaluate the performance of our suggested protocol utilizing a real-world dataset under various parameter configurations.

Keywords: Security, k-NN classifier, outsourced databases, encryption

Edition: Volume 4 Issue 6, June 2015

Pages: 709 - 711


How to Cite this Article?

Pranali D. Desai, Vinod S. Wadne, "Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=4061503, Volume 4 Issue 6, June 2015, 709 - 711

19 PDF Views | 16 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article



Similar Articles with Keyword 'k-NN classifier'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2258 - 2261

A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1708 - 1710

A Differential Diagnosis in Medical Field Using SOA and Classifier Techniques: A Review

Rashmi M. Jadhav, Roshani Ade

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 471 - 474

A Neural Network Approach to Character Recognition

Pritesh A. Pali, Anjusha Pimpalshende

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 389 - 391

KNN Classification of Encrypted Cloud Data with Privacy Preservation

Mayadevee Madhukar Kotlapure, L. J. Sankpal

Share this article



Similar Articles with Keyword 'outsourced databases'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2258 - 2261

A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 389 - 391

KNN Classification of Encrypted Cloud Data with Privacy Preservation

Mayadevee Madhukar Kotlapure, L. J. Sankpal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 437 - 440

Protection of Private Data in Association Rule Mining

Ashwini B. Yadav, Vikas B. Maral

Share this article



Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article
Top