Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 104

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Cloud computing infrastructure made information accessible to public which has become an appealing solution for the advantages on scalability and cost-saving. However, some data is so sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. The RASP data perturbation method provides secure and efficient range query and kNN query services for protected data in the cloud. The kNN-R algorithm works with the RASP range query algorithm to process the kNN queries. The nearest neighbors concept involves interpreting each entry in the database as a point in space. k Nearest Neighbors (kNN) algorithm selects k entries which are closest to the new point. However kNN algorithm performs slowly on large databases since each new entry has to be compared to every other entry. There is a alternative method proposed which is fit to the large sized databases. This method is FCNN i. e. fast condensed nearest neighbor data reduction method. In this method the database is summarized by finding only the important data points. The main purpose of this method is to approximate the nearest neighbor algorithm, 1NN, with a smaller, more representative set of data points.

Keywords: Cloud Computing, RASP, security, FCNN algorithm

Edition: Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Share this Article

How to Cite this Article?

Rashmi Kadu, Sonali Patil, "Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155895, Volume 4 Issue 6, June 2015, 2457 - 2462

Enter Your Email Address




Similar Articles with Keyword 'Cloud Computing'

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'RASP'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2120 - 2123

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, J. L. Chaudhari

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1144 - 1147

Survey of Health Monitoring Management Using Internet of Things (IOT)

Rajvardhini Katake, Bhagyashree Kute, Sharmili Ranjane, Shubham C. Jaiswal

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article



Top