Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Cloud computing infrastructure made information accessible to public which has become an appealing solution for the advantages on scalability and cost-saving. However, some data is so sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. The RASP data perturbation method provides secure and efficient range query and kNN query services for protected data in the cloud. The kNN-R algorithm works with the RASP range query algorithm to process the kNN queries. The nearest neighbors concept involves interpreting each entry in the database as a point in space. k Nearest Neighbors (kNN) algorithm selects k entries which are closest to the new point. However kNN algorithm performs slowly on large databases since each new entry has to be compared to every other entry. There is a alternative method proposed which is fit to the large sized databases. This method is FCNN i.e. fast condensed nearest neighbor data reduction method. In this method the database is summarized by finding only the important data points. The main purpose of this method is to approximate the nearest neighbor algorithm, 1NN, with a smaller, more representative set of data points.

Keywords: Cloud Computing, RASP, security, FCNN algorithm

Edition: Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Share this Article

How to Cite this Article?

Rashmi Kadu, Sonali Patil, "Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155895, Volume 4 Issue 6, June 2015, 2457 - 2462

123 PDF Views | 89 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'RASP'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 609 - 612

Review on Data Mining using Neural Network

Rasika Ashokrao Dugane, A. B. Raut

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1144 - 1147

Survey of Health Monitoring Management Using Internet of Things (IOT)

Rajvardhini Katake, Bhagyashree Kute, Sharmili Ranjane, Shubham C. Jaiswal

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top