An Effective Semantic Encrypted Relational Data Using K-Nn Model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Encrypted Relational Data with using K-Nn Classification

With the recent quality of cloud computing, users currently have the chance to source their information, in encrypted kind, still because the data processing tasks to the cloud. Since the info on the cloud is in encrypted kind, existing privacy-preserving classification techniques aren't applicable. During this paper, we tend to target resolution the classification drawback over encrypted infor...

متن کامل

K-NN Classifier for Relationally Encrypted Data

With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attack. IP is an internet protocol each and every system having a unique address to use this address to communicate to the internet. The...

متن کامل

Improvisation of K-nn Classifier on Semantically Secure Encrypted Relational Data

By the rapid improvement in web help and their popularity, web customers are developing day by day. Hence, there is large and various data. Data Mining has a wide use for the fields of business, medicine, experimental research and among government offices. One of the generally used tasks in data mining applications is Classification. Various professional and possible solutions to the classifica...

متن کامل

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...

متن کامل

CircularTrip: An Effective Algorithm for Continuous k NN Queries

Continuously monitoring kNN queries in a highly dynamic environment has become a necessity to many recent location-based applications. In this paper, we study the problem of continuous kNN query on the dataset with an in-memory grid index. We first present a novel data access method – CircularTrip. Then, an efficient CircularTrip-based continuous kNN algorithm is developed. Compared with the ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security, Privacy and Trust Management

سال: 2016

ISSN: 2277-5498,2319-4103

DOI: 10.5121/ijsptm.2016.5104