Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 148 , Downloads: 102 | CTR: 69 % | Weekly Popularity: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Cloud computing emerges as a hottest trend in area of information technology and heterogeneous networking. Due to less efficient allocation resources in a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we focused on two primary issues in such an environment search privacy and efficiency. We first come across a private searching scheme that was originally proposed by Ostrovsky. Their private based retrieval scheme allows a user to retrieve files of interest from un-trusted servers in leakage of any information. The main drawback is because of processing of all the queries from different users, it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can recover a higher percentage of matched files on user demand. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when the user only needs a small subset of files from large number of matched files. This system introduces retrieval of files with low bandwidth and low computational and communication cost. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.

Keywords: RASP, disruption, perturbation, kNN algorithm, confidential, CPEL criteria

Edition: Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Share this Article

How to Cite this Article?

Vanajakshi Devi.K, Praveen Kumar.N, "Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153918, Volume 4 Issue 4, April 2015, 3087 - 3089

148 PDF Views | 102 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'RASP'

Views: 148 , Downloads: 102 | CTR: 69 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Views: 135 , Downloads: 103 | CTR: 76 % | Weekly Popularity: ⮙2

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2120 - 2123

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, J. L. Chaudhari

Share this Article

Views: 140 , Downloads: 104 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1144 - 1147

Survey of Health Monitoring Management Using Internet of Things (IOT)

Rajvardhini Katake, Bhagyashree Kute, Sharmili Ranjane, Shubham C. Jaiswal

Share this Article

Similar Articles with Keyword 'disruption'

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1658 - 1661

Delay Tolerant Networks for Intermittently Connected Mobile Networks

M. Srikanth, A. Obulesh

Share this Article

Views: 148 , Downloads: 102 | CTR: 69 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Views: 136 , Downloads: 104 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

Views: 131 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 433 - 435

EDCD Method for Discovering Connectivity Disruption in WSN

P. Anbu Karthick, K. Brinda

Share this Article

Views: 132 , Downloads: 108 | CTR: 82 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this Article

Similar Articles with Keyword 'perturbation'

Views: 148 , Downloads: 102 | CTR: 69 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Views: 128 , Downloads: 104 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2120 - 2123

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, J. L. Chaudhari

Share this Article

Views: 120 , Downloads: 108 | CTR: 90 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this Article

Views: 136 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2339 - 2344

An Efficient Method to Restore Torn Digital Image with Enhanced Resolution

Shadiya N, Ameer Ali

Share this Article

Similar Articles with Keyword 'kNN algorithm'

Views: 148 , Downloads: 102 | CTR: 69 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Views: 141 , Downloads: 104 | CTR: 74 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2039 - 2041

Age Detection of Singer using KNN Algorithm

Sumeet S. Andhalkar

Share this Article

Views: 269 , Downloads: 203 | CTR: 75 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 12, December 2018

Pages: 110 - 113

Prediction of Sugarcane Yield using KNN and KNN Plus Clustering Algorithms

M. Naveen Kumar, Dr. M. Balakrishnan

Share this Article

Similar Articles with Keyword 'confidential'

Views: 121 , Downloads: 98 | CTR: 81 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Views: 151 , Downloads: 100 | CTR: 66 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article
Top