Downloads: 129 | Views: 307
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016 | Popularity: 6.5 / 10
KNN Classification of Encrypted Cloud Data with Privacy Preservation
Mayadevee Madhukar Kotlapure, L. J. Sankpal
Abstract: Data Mining has wide applications in different zones, for occurrence, keeping money, medicine, investigative examination and among government work environments. Solicitation is one of the regularly utilized assignments as a bit of data mining applications. As far back as decade, in view of the move of different confirmation issues, different theoretical and sound judgment answers for the solicitation issue have been proposed under arranged security models. Regardless, with the late reputation of passed on figuring, clients now have the chance to outsource their information, in encoded structure, moreover the data mining assignments to the cloud. Taking after the information on the cloud is in encoded structure, existing security guaranteeing depiction frameworks are not suitable. In this paper, we concentrate on comprehension the depiction issue over encoded information. Specifically, we propose a shielded k-NN classifier over mixed information in the cloud. The proposed convention ensures the course of action of information, security of client's data demand, and covers the information access traces. To the best of our taking in, our work is the first to add to a secured k-NN classifier over mixed information under the semi-genuine model. Likewise, we correctly break down the practicality of our proposed convention utilizing a true blue dataset under different parameter settings.
Keywords: Security, Outsourced Databases, Encryption, KNN Classifier
Edition: Volume 5 Issue 7, July 2016
Pages: 389 - 391
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 642 - 647Face Liveness to Identify Between Actual Face and Spoof Face
Lovely Pal, Renuka Singh