International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 105

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure


Abstract: Data Mining has wide applications in numerous zones, for example, keeping money, prescription, investigative exploration and among government offices. Order is one of the ordinarily utilized assignments as a part of information mining applications. For as far back as decade, due to the ascent of different protection issues, numerous hypothetical and commonsense answers for the order issue have been proposed under diverse security models. Notwithstanding, with the late fame of distributed computing, clients now have the chance to outsource their information, in encoded structure, and also the information mining assignments to the cloud. Since the information on the cloud is in encoded structure, existing security protecting characterization methods are not appropriate. In this paper, we concentrate on fathoming the characterization issue over encoded information. Specifically, we propose a safe k-NN classifier over scrambled information in the cloud. The proposed convention ensures the classification of information, security of client's data inquiry, and shrouds the information access designs. To the best of our learning, our work is the first to add to a safe k-NN classifier over scrambled information under the semi-legitimate model. Additionally, we exactly dissect the effectiveness of our proposed convention utilizing a genuine dataset under diverse parameter settings.


Keywords: Security, k-NN Classifier, Outsourced Databases,


Edition: Volume 4 Issue 11, November 2015,


Pages: 2258 - 2261


How to Cite this Article?

Mayadevi Kotlapure, "A Survey on k-NN Classification over Semantically Secure Encrypted Relational", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 2258-2261, https://www.ijsr.net/get_abstract.php?paper_id=NOV151726

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Security'

Downloads: 122 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article


Top