Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information
Pranali D. Desai, Vinod S. Wadne
Data Mining has wide use in many fields such as financial, medication, medical research and among govt. departments. Classification is one of the widely applied works in data mining applications. For the past several years, due to the increase of various privacy problems, many conceptual and realistic alternatives to the classification issue have been suggested under various protection designs. On the other hand, with the latest reputation of cloud processing, users now have to be able to delegate their data, in encoded form, as well as the information mining task to the cloud. Considering that the information on the cloud is in secured type, current privacy-preserving classification methods are not appropriate. In this paper, we concentrate on fixing the classification issue over encoded data. In specific, we recommend a protected k-NN classifier over secured data in the cloud. The suggested protocol defends the privacy of information, comfort of user-s feedback query, and conceals the information access styles. To the best of our information, our task is the first to create a protected k-NN classifier over secured data under the semi-honest model. Also, we empirically evaluate the performance of our suggested protocol utilizing a real-world dataset under various parameter configurations.
Keywords: Security, k-NN classifier, outsourced databases, encryption
Edition: Volume 4 Issue 6, June 2015
Pages: 709 - 711
How to Cite this Article?
Pranali D. Desai, Vinod S. Wadne, "Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=4061503, Volume 4 Issue 6, June 2015, 709 - 711
101 PDF Views | 90 PDF Downloads
Similar Articles with Keyword 'Security'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'k-NN classifier'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1708 - 1710A Differential Diagnosis in Medical Field Using SOA and Classifier Techniques: A Review
Rashmi M. Jadhav, Roshani Ade
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2258 - 2261A Survey on k-NN Classification over Semantically Secure Encrypted Relational
Mayadevi Kotlapure
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 471 - 474A Neural Network Approach to Character Recognition
Pritesh A. Pali, Anjusha Pimpalshende
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 709 - 711Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information
Pranali D. Desai, Vinod S. Wadne
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 389 - 391KNN Classification of Encrypted Cloud Data with Privacy Preservation
Mayadevee Madhukar Kotlapure, L. J. Sankpal
Similar Articles with Keyword 'outsourced databases'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2258 - 2261A Survey on k-NN Classification over Semantically Secure Encrypted Relational
Mayadevi Kotlapure
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1698 - 1704Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
V. Maruvoor Arasi, Carolene
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 709 - 711Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information
Pranali D. Desai, Vinod S. Wadne
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 437 - 440Protection of Private Data in Association Rule Mining
Ashwini B. Yadav, Vikas B. Maral
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 389 - 391KNN Classification of Encrypted Cloud Data with Privacy Preservation
Mayadevee Madhukar Kotlapure, L. J. Sankpal
Similar Articles with Keyword 'encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe