Filters








1,336 Hits in 4.9 sec

Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Swathy J., Surya S.R.
2016 International Journal of Computer Applications  
This paper reviews how to perform privacy preserving k-NN classification over encrypted data in the cloud.  ...  The data in the cloud are in encrypted form, existing privacy preserving classification systems are not relevant.  ...  Efficiently perform a classification over encrypted data using the privacy preserving k-nearest neighbor(PPKNN) classification.  ... 
doi:10.5120/ijca2016907988 fatcat:pf22srgllbdndkhbcfusb2y2vi

Data Mining Over Encrypted Data of Database Client Engine Using Hybrid Classification Approach

Bhagyashree Ambulkar, Prof. Gunjan Agre
2017 International Journal of Innovative Research in Computer Science & Technology  
This paper describes AES encryption technique which is highly secure and efficient.  ...  using k-NN algorithm from encrypted data of relational databases.  ...  [3] [14] proposes a novel secure k-nearest neighbour query convention over encrypted data.  ... 
doi:10.21276/ijircst.2017.5.3.7 fatcat:f6eu5kkbr5ajvangeol2eia2dy

A Survey On Privacy Preserving Technique Using K- Nearest Neighbor Classification

Rashmi Sheshrao Kodane, Prof. Karuna Bagde
2016 Zenodo  
This paper proposed a novel privacy-preserving k-NN classification protocol over encrypted data in the cloud.  ...  The existing techniques are not applicable to outsourced database environments where the data resides in encrypted form on a third-party server.  ...  K. Samanthula [12] , proposed a novel secure k-nearest neighbour query protocol over encrypted data.  ... 
doi:10.5281/zenodo.47037 fatcat:hlupepfcyjb3jjnjsnsc7arib4

Enhancing Security using Image Processing
english

Rahul Kumar, Ajit Pratap Singh
2015 International Journal of Innovative Research in Science, Engineering and Technology  
K-Nearest method is used to stitch the parts obtained.  ...  Image which has to be sent over the network or transferred using any electronic mode can be secured by the use of image steganography and stitching.  ...  After we find the K-Nearest neighbours then simple majority of these K-Nearest neighbours is taken to be the prediction of the query instance. ü An arbitrary instance is represented by ( 1 x , 2 x , 3  ... 
doi:10.15680/ijirset.2015.0404045 fatcat:vckwe6ns3fe77n2azid5gbkbym

Non-interactive Privacy-preserving k-NN Classifier

Hilder V. L. Pereira, Diego F. Aranha
2017 Proceedings of the 3rd International Conference on Information Systems Security and Privacy  
In this paper, we propose privacy-preserving versions of the k-NN classifier which operate over encrypted data, combining orderpreserving encryption and homomorphic encryption.  ...  In particular, the cloud server does not need to be trusted beyond correct execution of the protocol and computes the algorithm over encrypted data and encrypted classes.  ...  ACKNOWLEDGMENTS We thank Google Inc. for the financial support through the Latin America Research Awards "Machine learning over encrypted data using Homomorphic Encryption" and "Efficient homomorphic encryption  ... 
doi:10.5220/0006187703620371 dblp:conf/icissp/PereiraA17 fatcat:zxw47gel5vgpdnlgwrykcmaaa4

SOPE: A Spatial Order Preserving Encryption Model for Multi-dimensional Data [article]

Eirini Molla, Theodoros Tzouramanis, Stefanos Gritzalis
2017 arXiv   pre-print
range of well-known queries over the encrypted d-dimensional data.  ...  The safe storage and efficient retrieval of d-dimensional data on an untrusted server has therefore crucial importance.  ...  and address the problem of nearest neighbour and skyline search respectively over the encrypted data.  ... 
arXiv:1710.09420v1 fatcat:rfwkkas5azefnifrzu2wjuvcdq

Security Using Image Processing

Jyotika Kapur, Akshay J. Baregar
2013 International Journal of Managing Information Technology  
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode.  ...  The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved. Keywords Cryptography, image steganography, image stitching.  ...  For each feature find nearest-k -neighbours using a k-d tree • III. For each image: • (i)  ... 
doi:10.5121/ijmit.2013.5202 fatcat:ojdlzx6pzbfa7ltb2sydey4qzi

Security Using Image Processing

Jyotika Kapur, Akshay. J. Baregar
2013 Zenodo  
The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.  ...  Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode.  ...  For each feature find nearest-k -neighbours using a k-d tree • III. For each image: • (i)  ... 
doi:10.5281/zenodo.3865131 fatcat:bahto4ukqjg2fn7yuaikahe7r4

Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism

E. Suresh Babu, C. Nagaraju, M.H.M. Krishna Prasad
2015 Procedia Computer Science  
This paper presents a novel concept for designing an efficient security solution that can protect wireless ad hoc networks from heterogeneous attacks.  ...  Finally, this methods had been validated through numerous simulation scenarios that synthetically generates the data sets and verifies using various parameters such as Route Acquisition Time, Throughput  ...  These advantages paved the way to resolve the issues such as efficiency, ease to use, and high deployment cost over conventional wired networks.  ... 
doi:10.1016/j.procs.2015.10.029 fatcat:s7vic3lu3jbw5gsicvkhkltsqy

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database [chapter]

Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
2016 Lecture Notes in Computer Science  
Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point.  ...  We also show that the proposed protocol ensures the privacy and the security of the data and the query point.  ...  In this paper, we study the problem of k-Nearest Neighbour (k-NN) query processing over encrypted spatial data.  ... 
doi:10.1007/978-3-319-40253-6_11 fatcat:ppa3nbm4uzcjjmugjnmiav5yia

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu
2019 IEEE Internet of Things Journal  
over encrypted datasets.  ...  To support efficient updates, it integrates the sliding window model to periodically evict the expired data in order to maintain a constant update time.  ...  the k-nearest neighbours (kNN) and k-distance of each data point.  ... 
doi:10.1109/jiot.2019.2949374 fatcat:7lccz65m3behpdwum5bar7azgq

Third Party Data Clustering Over Encrypted Data Without Data Owner Participation: Introducing the Encrypted Distance Matrix [chapter]

Nawal Almutairi, Frans Coenen, Keith Dures
2018 Lecture Notes in Computer Science  
The approach operates using the idea of an Encrypted Distance Matrix (EDM) which, for illustrative purposes, has been embedded in an approach to secure third-party data clustering -the Secure Nearest Neighbour  ...  This paper proposes an approach to secure data clustering that does not require any data owner participation (once the data has been encrypted).  ...  Secure Nearest Neighbour Clustering This section presents the proposed Secure Nearest Neighbour Clustering (SNNC) approach designed to operate over encrypted data and without any further user participation  ... 
doi:10.1007/978-3-319-98539-8_13 fatcat:y5ttehylprf33jjichc7d3sfya

Achieving Efficient Multi-Keyword Ranked Search over Encrypted Cloud Data Using Bloom Filters

2017 International Journal of Science and Research (IJSR)  
The main goal of efficient and secure search is building up the searchable encryption for multi-keyword ranked search over the scalable data documents that are stored on cloud.  ...  As there is large amount data present in the cloud it is very important to have a multi-keyword search over the encrypted data.  ...  Li, -Secure k-nearest first time gave a K. Ren, and neighbour, secured and ranked W.  ... 
doi:10.21275/art20164430 fatcat:m2xykjs4dve7lb3fymkdpiz45i

Using Image Processing In Security

Shivam Sharma
2016 International Journal Of Engineering And Computer Science  
The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.  ...  Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode.  ...  After we find the k nearest neighbours simple majority of these K-nearest neighbours is taken to be the prediction of the query instance.  ... 
doi:10.18535/ijecs/v4i11.01 fatcat:vgsjentntrd5porrcwkarjqmb4

Literature Survey On Automatic Emergency Service System

PUSHKAR THAKUR, MRS. DHANASHREE A. PHALKE, ANURADHA BHARTI, ANSHIKA, RUCHIKA JAGNANI
2018 Zenodo  
Some of them for finding neighbour are K-nearest neighbour, Approximate nearest neighbour, Nearest neighbour distance ratio, etc. and for the encryption are AES, MD5, RSA, etc.  ...  K-nn algorithm is used to find the top k nearest neighbour among all the identified neighbours.  ... 
doi:10.5281/zenodo.1410266 fatcat:5fjyywhfuzajppg3x53jazkl5a
« Previous Showing results 1 — 15 out of 1,336 results