Abstract: Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

In recent days, the amount of information generated has grown fastly. With that large amount of information in addition to the complexity of the data, require refined management schemes that are ahead of the capabilities of many small businesses or persons. Over the past few years outsourcing spatial data has developed rapidly with the popularity of location-based services and the plentiful usage of smart phones and GPS enabled mechanisms. As a result, the outsourcing database paradigm is more and more all the rage that has received a lot of concentration in the research area. In this model the data owner (DO) entrusts the management and preservation of its database to a third-party service provider (SP) which is accountable for indexing the data and responding client queries from anywhere. In this work, proposes an effective method on the Outsourced Spatial Database (OSDB) model called VN which permits a client to authenticate the accuracy and unity of the result set based on user query. An interactive protocol between the server (Prover) and the querier (Verifier) that gives the concluding with zero-knowledge evidence that the Prover has a valid Condensed-RSA signature in line with the records in the query result set. The server returns to the querier the result set along with a witness. The querier then sends a random challenge to which the server responds with a valid response to the client. The reply among the witness induces the querier of servers knowledge of the Condensed-RSA signature, devoid of disclosing any information about the Condensed-RSA signature itself. Additionally, present the multisignature scheme that is provably secure devoid of random oracles where a single short object the multisignature can substituten signatures by n signers that all on the same message.

Keywords: Query Authentication, Spatial Queries, Outsourced Databases, Condensed-RSA Signature, Multi Signature Scheme, Voronoi Diagrams

Edition: Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Share this Article

How to Cite this Article?

V. Maruvoor Arasi, Carolene, "Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14365, Volume 3 Issue 9, September 2014, 1698 - 1704

Enter Your Email Address


Similar Articles with Keyword 'Spatial Queries'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2578 - 2580

Developing an Effective System for Keyword Based Query Processing

Ashwini P. Kshirsagar, G.M.Bhandari

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2377 - 2379

Survey of Fast Nearest Neighbor Search

Rutuja Panjabrao Desai, S. R. Patil

Share this Article

Similar Articles with Keyword 'Outsourced Databases'

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2258 - 2261

A Survey on k-NN Classification over Semantically Secure Encrypted Relational

Mayadevi Kotlapure

Share this Article

Downloads: 116

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this Article

Similar Articles with Keyword 'Query'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Spatial'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 66 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Similar Articles with Keyword 'Queries'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 36 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 716 - 719

Extra Hand - An Android Application

Akash Mishra, Sana Tak

Share this Article

Similar Articles with Keyword 'Outsourced'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Similar Articles with Keyword 'Databases'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Similar Articles with Keyword 'Signature'

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'Multi'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article
Top