Professional Documents
Culture Documents
COLLEGE OF ENGINEERING
(AUTONOMOUS)
Guided by,
Mrs.M.K.Nivodhini M.E.,
Asst Professor-CSE
Presented by,
M.Sai Arun Prasath(1333015)
II-M.E-CSE
Content
Abstract
Introduction
Literature Survey
Existing System
Proposed System
System Architecture
Modules Description
Conclusion
References
Abstract
Authentication on Location based services contributes major
process of extracting queries from client
Since database is protected from third party violation can be
completely avoided
The vigorous secure family of encryption technique with
k-NN used
Service Provider will be the responsible for indexing the data,
query process with instance updating from the Data Owners
Introduction
Process of analyzes a large amount of data to find new and
hidden information that improves business efficiency
01/26/15
Literature Survey
Database Outsourcing
Frameworks
Existing System
Existing system had solved query verification problem simply
Disadvantages
Pre-computation- based approaches incur high I/O and
computation costs
None of the proposed mechanisms have considered the
query integrity problem
Suffer from efficiency-degraded index structure due to the
storage of additional hashes and its absence of updating
Existing technique are not flexible enough .They support only
restricted operations
Prohibitively expensive for practical uses
Proposed System
Advantages
SYSTEM ARCHITECTURE
Spatial
distance
-calculation
Shortest pathlookup
Reposito
ry
Data
Encryption
Owner-side
process
Signing
Data
Cloud
Service
provider
Ciphe
r
Text
Data
Data
Maintenance
After
authenticat
progress
ion
Required
query
processing
Outsourcing to
cloud service
as encrypted
format
Client side
process
Modules
Multi-Data Owners k-NN surveillance
State of data preserving
Records Validating Process
SP side maintenance
User side interrogation
01/26/15
19
01/26/15
20
SP Side Maintenance
The information receiving from data owners will be saved as
cipher text.
Due to this third party will not able to obtain the original
information easily.
Spatial & neighbors signatures details storage will avoid the
maintenance cost from owner side.
01/26/15
21
01/26/15
22
CONCLUSION
In this proposed system two schemes to support secure k nearest
neighbor query processing the Dijikstras algorithm with encryption
algorithm. They both use mutable-Order Preserving Encoding (mOPE) as a building block. Dijikstra provides exact results, but its
performance overhead may be higher. k-NN only offers
approximate NN results, but with better performance. In addition,
the accuracy of k-NN is very close to that of the exact method. In
order to investigate the complex secure evaluation functions on
cipher texts, such as skyline queries and research formal security
protection guarantees against the client, to prevent it from
learning anything other than the received k query results.
01/26/15
23
REFERENCES
[1] Yinan Jing,Member, IEEE,Ling Hu, Wei-Shinn Ku,Senior Member,
IEEE, Authentication of k Nearest Neighbor Query on Road
Networks vol. 26, no. 6, June 2014.
[2] F. Gens. (2011, Oct. 20). IDCs new IT cloud services forecast:
2009- 2013 [Online].
[3] H.Hacigms, S.Mehrotra and B.R.Iyer,Providing database as a
service ,in Proc. 18th ICDE,SanJose,CA,USA,2002,pp. 2938.
[4] Google Maps [Online]. Available: http://maps.google.com/
[5] M. Erwig, The graph voronoi diagram with applications, Netw.,
vol. 36, no. 3, pp. 156163, Oct. 2000.
01/26/15
24
25