ALGEBRAIC COLLECTION EXPLORATION ON CIPHERTEXT SPATIAL INFORMATION

Hyderabad Sowjanya, P. Aswani

Abstract


Geometric range look is an essential primitive for spatial information examination in SQL and NonSQL databases. It has broad applications in area based administrations, computer aided  plan, and computational geometry. Due to the sensational increment in information measure, it is vital for organizations and associations to outsource their spatial informational collections to outsider cloud administrations (e.g., Amazon) keeping in mind the end goal to diminish capacity and inquiry handling costs, at the same time, in the interim, with the guarantee of no security spillage to the outsider. Accessible encryption is a strategy to perform significant inquiries on scrambled information without uncovering protection. Be that as it may, geometric range seek on spatial information has not been completely researched nor upheld by existing accessible encryption plans. In this paper, we outline a symmetric-key accessible encryption conspire that can bolster geometric range questions on encoded spatial information. One of our real commitments is that our outline is a general approach, which can bolster distinctive sorts of geometric range questions. At the end of the day, our plan on encoded information is free from the shapes of geometric range inquiries. In addition, we additionally broaden our conspire with the extra utilization of tree structures to accomplish look many-sided quality that is speedier than direct.


Keywords


Geometric Range Seek; Spatial Information; Encoded Information;

References


B. Wang, Y. Hou, M. Li, H. Wang, H. Li, and F. Li, ÒTree-based Multi-Dimensional Range Search on encrypted data with enhanced privacy,Ó in Proc. SECURECOMM, 2014.

C. Shahabi, L. Fan, L. Nocera, L. Xiong, and M. Li, ÒPrivacy-preserving inference of social relationships from location data: A vision paper,Ó in Proc. ACM SIGSPATIAL GIS, 2015

J. Lai, X. Zhou, R. H. Deng, Y. Li, and K. Chen, ÒExpressive search on encrypted data,Ó in Proc. ACM ASIA CCS, 2013, pp. 243Ð251.

V. Pappas et al., ÒBlind seer: A scalable private DBMS,Ó in Proc. IEEE SP, May 2014, pp. 359Ð374.

M. J. Atallah and W. Du, ÒSecure multi-party computational geometry,Ó in Proc. Int. Workshop Algorithms Data Struct., 2001, pp. 165Ð179

V. Singh. A Practical Key Exchange for the Internet using Lattice Cryptography. [Online]. Available: https://eprint.iacr.org/2015/138.pdf, accessed 2015.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.