Classification and Privacy Preserving Search of Multimedia Data

  • Authors

    • J Jeejo Vetharaj
    • S Selvanayaki
    • M B.Suseela
    2018-09-01
    https://doi.org/10.14419/ijet.v7i3.34.18980
  • Outsourced database, data access patterns, privacy preserving classification.
  • Classification, which is commonly used task in data mining applications separates the data present in the database based on some category. For years and years, considering the rise of several privacy issues, solutions in the form of theoretical and practical have been proposed for the classification problem under various security models. However, for the late Notoriety about cloud computing, clients presently have the chance on outsource their data, clinched alongside encrypted form, and also those information mining assignments of the cloud.. The data on the cloud which is in encrypted form, therefore existing privacy preserving classification techniques are not applicable. In this paper, we focus on finding solution for the classification problem over the encrypted data .Users can store their data with encryption by the use of ordered relational data. So, the data is obtained correctly without decrypting. 
  • References

    1. [1] P. Mell and T. Grance, “The NIST definition of cloud computing (draft),†NIST Special Publication, vol. 800, p. 145, 2011.

      [2] S. De Capitani di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,†in Proc. 7th Int. Conf. Risk Security Internet Syst., 2012, pp. 1–9. 1272 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 5, MAY 2015

      [3] P. Williams, R. Sion, and B. Carbunar, “Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage,†in Proc. 15th ACM Conf. Comput. Commun. Security, 2008, pp. 139–148.

      [4] P. Paillier, “Public key cryptosystems based on composite degree residuosity classes,†in Proc. 17th Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223–238.

      [5] B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “knearest neighbor classification over semantically secure encrypted relational data,â€eprint arXiv:1403.5001, 2014.

      [6] C. Gentry, “Fully homomorphic encryption using ideal lattices,†in Proc. 41st Annu. ACM Sympos. Theory Comput., 2009, pp. 169– 178.

      [7] C. Gentry and S. Halevi, “Implementing gentry’s fully-homomorphic encryption scheme,†in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptographic Techn.: Adv. Cryptol., 2011, pp. 129–148.

      [8] A. Shamir, “How to share a secret,†Commun. ACM, vol. 22, pp. 612–613, 1979.

      [9] D. Bogdanov, S. Laur, and J. Willemson, “Sharemind: A framework for fast privacy-preserving computations,†in Proc. 13th Eur. Symp. Res. Comput. Security: Comput. Security, 2008, pp. 192–206.

      [10] R. Agrawal and R. Srikant, “Privacy-preserving data mining,†ACM Sigmod Rec., vol. 29, pp. 439– 450, 2000.

  • Downloads

  • How to Cite

    Jeejo Vetharaj, J., Selvanayaki, S., & B.Suseela, M. (2018). Classification and Privacy Preserving Search of Multimedia Data. International Journal of Engineering & Technology, 7(3.34), 259-261. https://doi.org/10.14419/ijet.v7i3.34.18980