High Reliable Spatial Query Processing Using Secure RC5 Algorithm

naga malleswararao

Abstract


Cloud computing data is stored over the distributed servers, which can be accessed with the help of user queries. In cloud computing, millions of user queries are processed by distributed server with less latency, high availability and high reliability. However, providing confidentiality user queries is still a challenging task due to the high vulnerability exist in the cloud environment. The existing mechanisms suffer from high computational and communication overhead, in addition to vulnerabilities still exists in their security mechanisms. In our proposed approach, any user send the spatial queries to the service provider, then the service provider use these spatial queries to check on the spatial encrypted data. User uses the RC5 key to decrypt the response messages. In this entire process, users is able to protect the data from the data leakage, reduces the communication overhead when compared with other existing mechanisms.

Full Text:

PDF

References


Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials,, vol. 15, no. 2, pp. 843–859, 2013.

M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data,” The VLDB Journal, vol. 19, no. 3, pp. 363–384, 2010.

P. Wang and C. V. Ravishankar, “Secure and efficient range queries on outsourced databases using r-trees,” in 2013 IEEE 29th International Conference on Data Engineering (ICDE). IEEE, 2013, pp. 314– 325.

A. M. Talha, I. Kamel, and Z. A. Aghbari, “Enhancing confidentiality and privacy of outsourced spatial data,” in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 2015, pp. 13–18.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE Infocom, 2010 proceedings. IEEE, 2010, pp. 1–9.

H. Xu, S. Guo, and K. Chen, “Building confidential and efficient query services in the cloud with rasp data perturbation,” IEEE transactions on knowledge and data engineering, vol. 26, no. 2, pp. 322–335, 2014.

H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism,” in IEEE 27th International Conference on Data Engineering. IEEE, 2011, pp. 601– 612.

G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, “Trusted data sharing over untrusted cloud storage providers,” in IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2010, pp. 97–103.

H. Hacigum¨ us, B. Iyer, and S. Mehrotra, “Providing database as a ¨ service,” in 18th International Conference on Data Engineering, 2002. Proceedings. IEEE, 2002, pp. 29–38.

E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, “Balancing confidentiality and efficiency in untrusted relational dbmss,” in Proceedings of the 10th ACM conference on Computer and Communications Security. ACM, 2003, pp. 93–102.

W.-S. Ku, L. Hu, C. Shahabi, and H. Wang, “Query integrity assurance of location-based services accessing outsourced spatial databases,” in Advances in Spatial and Temporal Databases. Springer, 2009, pp. 80– 97.

A. Khoshgozaran and C. Shahabi, “Private buddy search: Enabling private spatial queries in social networks,” in International Conference on Computational Science and Engineering, 2009 (CSE’09)., vol. 4. IEEE, 2009, pp. 166–173.

Anil Kumar Uppula , Srinivasulu Tadisetty ,” Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme,”International Journal of Computer Engineering In Research Trends.,vol.3,no.9,pp.487- 491,September 2016.

Venkata Srinivasu Veesam, Bandaru Satish Babu,” Evaluation of Captcha Technologies towards Graphical Password Scheme,” International Journal of Computer Engineering In Research Trends.,vol.2,no.1,pp.98-106,February 2015.

D.J. Ashpin Pabi, N.Puviarasan, P.Aruna,” Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO),” International Journal of Computer Engineering In Research Trends.,vol.4,no.4,pp.128-135,April 2017.




DOI: https://doi.org/10.23956/ijarcsse.v8i12.908

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.