International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Secure Query Processing of Outsourced Data Using Privacy Homomorphism: kNN and Distance Decoding Algorithm

Rupali S. Khachane


Abstract: Cloud computing and data outsourcing helps with more convenient ways of working to different types of business enterprises. There is cloud, data owner and customers/clients. Query of data users and privacy of the data owners are most importance part of modern days cloud computing and data management. From long time lot of people researched on cloud computing and cloud security because query processing preserves data privacy of the data owners as well as clients. To provide more security features a PH technique is used. Privacy Homomorphism (PH) is emphasizes to resolve the privacy of query processing from client side and cloud with the kNN on R-tree index query and distance re-coding algorithm. PH leverages performance of cloud computing


Keywords: Privacy homomorphisms, Encrypted data processing, Decryption, privacy preserving process


Edition: Volume 3 Issue 12, December 2014,


Pages: 1215 - 1219


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rupali S. Khachane, "Secure Query Processing of Outsourced Data Using Privacy Homomorphism: kNN and Distance Decoding Algorithm", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1215-1219, https://www.ijsr.net/get_abstract.php?paper_id=SUB14564

Similar Articles with Keyword 'Decryption'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top