Open Access   Article Go Back

A Unified Framework for Cloud Computing using AES and k-NN Classifier

VARUN K H1 , GIRIHA G S2

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 1-5, May-2016

Online published on Jun 07, 2016

Copyright © VARUN K H , GIRISHA G S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: VARUN K H , GIRISHA G S, “A Unified Framework for Cloud Computing using AES and k-NN Classifier,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.1-5, 2016.

MLA Style Citation: VARUN K H , GIRISHA G S "A Unified Framework for Cloud Computing using AES and k-NN Classifier." International Journal of Computer Sciences and Engineering 04.03 (2016): 1-5.

APA Style Citation: VARUN K H , GIRISHA G S, (2016). A Unified Framework for Cloud Computing using AES and k-NN Classifier. International Journal of Computer Sciences and Engineering, 04(03), 1-5.

BibTex Style Citation:
@article{H_2016,
author = {VARUN K H , GIRISHA G S},
title = {A Unified Framework for Cloud Computing using AES and k-NN Classifier},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {1-5},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=52},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=52
TI - A Unified Framework for Cloud Computing using AES and k-NN Classifier
T2 - International Journal of Computer Sciences and Engineering
AU - VARUN K H , GIRISHA G S
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 1-5
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

Data Mining is a way to distillate knowledge from large data sets. Classification consists of predicting a certain outcome based on the given input. Cloud provides the customers to store large amount of data. When classification is done on such large data sets we will know the true potential. But the problem with cloud is that the data is outsourced and anybody can access the data. This has made majority of companies not use the services of cloud. These companies need to give security to customer’s data. One of the ways to provide security to data is by using encryption. But classification cannot be done on encrypted data. This paper addresses the Data Mining over Encrypted Data (DMED) problem. We use the AES and the k-NN classifier to propose a unified framework to provide confidentiality of data.

Key-Words / Index Term

AES, k-NN classifier, Data Mining over Encrupted Data

References

[1] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Sympos. Theory Comput., 2009, pp. 169–178.
[2] C. Gentry and S. Halevi, “Implementing gentry’s fully-homomorphic encryption scheme,” in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptographic Techn.: Adv. Cryptol., 2011, pp. 129–148.
[3] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, 1979.
[4] R. Agrawal and R. Srikant, “Privacy-preserving data mining,” ACM Sigmod Rec., vol. 29, pp. 439–450, 2000.
[5] Y. Lindell and B. Pinkas, “Privacy preserving data mining,” in Proc. 20th Annu. Int. Cryptol. Conf. Adv. Cryptol., 2000, pp. 36–54.
[6] P. Zhang, Y. Tong, S. Tang, and D. Yang, “Privacy preserving Naive Bayes classification,” in Proc. 1st Int. Conf. Adv. Data Mining Appl., 2005, pp. 744–752.
[7] L. Xiong, S. Chitti, and L. Liu, “K nearest neighbor classification across multiple private databases,” in Proc. 15th ACM Int. Conf. Inform. Knowl. Manage., 2006, pp. 840–841.
[8] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2004, pp. 563–574.
[9] X. Xiao, F. Li, and B. Yao, “Secure nearest neighbor revisited,” in Proc. IEEE Int. Conf. Data Eng., 2013, pp. 733–744.
[10] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol. 14, No. 2, pp (105-110), Feb 2016 .ISSN: 1947-5500
[11] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, Ist IEEE Symposium on Colossal Data Analysis and Networking (CDAN-2016)”, Mar 18th -19th, 2016. ISBN: 978-1-5090-0669-4
[12] B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data,” eprint arXiv:1403.5001, 2014.