Open Access   Article Go Back

K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence

Dr.V.Maniraj 1 , V.Krishnaveni 2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 288-291, Apr-2016

Online published on Apr 27, 2016

Copyright © Dr.V.Maniraj, V.Krishnaveni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dr.V.Maniraj, V.Krishnaveni, “K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.288-291, 2016.

MLA Style Citation: Dr.V.Maniraj, V.Krishnaveni "K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence." International Journal of Computer Sciences and Engineering 4.4 (2016): 288-291.

APA Style Citation: Dr.V.Maniraj, V.Krishnaveni, (2016). K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence. International Journal of Computer Sciences and Engineering, 4(4), 288-291.

BibTex Style Citation:
@article{_2016,
author = {Dr.V.Maniraj, V.Krishnaveni},
title = {K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {288-291},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=934},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=934
TI - K-Nearest Neighbor Grouping in Excess of Semantically Secure Encryption Interactive Evidence
T2 - International Journal of Computer Sciences and Engineering
AU - Dr.V.Maniraj, V.Krishnaveni
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 288-291
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1408 1294 downloads 1396 downloads
  
  
           

Abstract

Data Mining has wide use in numerous fields such as financial, medication, medical research also, among govt. departments. Grouping is one of the widely connected works in Data Mining applications. For the past several years, due to the increment of diverse security problems, numerous conceptual also, practical options to the grouping issue have been proposed under diverse security designs. On the other hand, with the latest reputation of cloud processing, users now have to be capable to delegate their data, in encoded form, as well as the Data Mining undertaking to the cloud. Considering that the information on the cloud is in secured type, current privacy-ensuring grouping strategies are not appropriate. In this paper, we concentrate on fixing the grouping issue over encoded data. In specific, we prescribe a secured k-NN classifier over secured information in the cloud. The proposed convention safeguards the security of information, solace of user’s criticism query, also, disguises the information access styles. To the best of our information, our undertaking is the initially to make a secured k-NN classifier over secured information under the semi-honest model. Also, we empirically evaluate the execution of our proposed convention utilizing a real-world dataset under diverse parameter configurations.

Key-Words / Index Term

Security, k-NN Classifier, Outsourced Databases, Encryption

References

[1] R. Vidya Banu; N. Nagaveni, “Preservation of Data Privacy Using PCA Based Transformation, ARTCom '09. International Conference on Year: 2009 Pages: 439 – 443.
[2] Vaishnavi L. Kaundanya; Anita Patil; Ashish Panat, “Performance of k-NN classifier for emotion detection using EEG signals”, Communications and Signal Processing (ICCSP), 2015 International Conference on Year: 2015 Pages: 1160 – 1164.
[3] C. Rodriguez; F. Boto; I. Soraluze; A. Perez, “An incremental and hierarchical k-NN classifier for handwritten characters” Pattern Recognition, 2002. Proceedings. 16th International Conference on Year: 2002, Volume: 3 Pages: 98 – 101.
[4] Mahdi Hasanlou; Farhad Samadzadegan, “Comparative Study of Intrinsic Dimensionality Estimation and Dimension Reduction Techniques on Hyperspectral Images Using K-NN Classifier”, IEEE Geoscience and Remote Sensing Letters Year: 2012, Volume: 9, Issue: 6 Pages: 1046 – 1050.
[5] Ankita Srivastava; M. P. Singh; Prabhat Kumar, “Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier”, Information Technology: New Generations (ITNG), 2014 11th International Conference on Year: 2014 Pages: 502 – 507.
[6] I.Soraluze; C. Rodriguez; F. Boto; A. Perez, “Multidimensional multistage k-NN classifiers for handwritten digit recognition”, Proceedings. Eighth International Workshop on Year: 2002 Pages: 19 – 23.