CFP last date
20 May 2024
Reseach Article

Optimized kNN Query Processing using Clustering in Untrusted Cloud Environment

by Lokesh.v, Anandajayam. P, Shanmugasundaram.s
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 10
Year of Publication: 2015
Authors: Lokesh.v, Anandajayam. P, Shanmugasundaram.s
10.5120/20184-2405

Lokesh.v, Anandajayam. P, Shanmugasundaram.s . Optimized kNN Query Processing using Clustering in Untrusted Cloud Environment. International Journal of Computer Applications. 115, 10 ( April 2015), 1-3. DOI=10.5120/20184-2405

@article{ 10.5120/20184-2405,
author = { Lokesh.v, Anandajayam. P, Shanmugasundaram.s },
title = { Optimized kNN Query Processing using Clustering in Untrusted Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 10 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number10/20184-2405/ },
doi = { 10.5120/20184-2405 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:25.333603+05:30
%A Lokesh.v
%A Anandajayam. P
%A Shanmugasundaram.s
%T Optimized kNN Query Processing using Clustering in Untrusted Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 10
%P 1-3
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The query processing optimization is done using an efficient clustering method for the purpose of fast retrieval of the queries. The main desire of a user is to query regarding the point of interest such as nearby restaurants, cafes, etc. , The Location Based Service (LBS) enables the user to access their information about their POI (Point Of Interest). Users send their present location as query and they want to get their output as the nearest POI. Due to absence of technical concerns to support query processing on wider scales, they present the data storage and querying to the cloud service provider. The user will present their query to the data owner and, the data owner will present the data storage and querying of the client, to the cloud service provider. The security for this query processing technique is provided by the mutable order preserving encoding (mOPE) and cryptographic security process (AES and DES). Here, they previously used cloaking region and PIR (Private Information Retrieval). Now we propose Voronoi Diagram along with a new clustering method known as Self Updating Clustering Method. By using this clustering method, we can get the nearest neighbor query in a fast and efficient manner.

References
  1. Gabriel Ghinita, PanosKalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan, "Private Queries in Location Based Services: Anonymizers are not Necessary", SIGMOD 2008
  2. Gabriel Ghinita, PanosKalnis, Murat Kantarcioglu, andElisa Bertino, "A Hybrid Technique for Private LocationBasedQueries with Database Protection", SSTD2009
  3. Gabriel Ghinita, PanosKalnis, Murat Kantarcioglu, andElisa Bertino, Approximate and exact hybrid algorithmsfor private nearest-neighbor queries with database protection, Geoinformatica 2011
  4. Gruteser M. and Grunwald D. , Anonymous usage oflocation-based services through spatial and temporalcloaking, MOBISYS 2003
  5. Gedik B. and Liu L. , Location privacy in mobile systems:a personalized anonymization model, ICDCS 2005
  6. Mokbel M. F. , Chow C. Y. , and Aref W. G. , The newCasper: query processing for location services withoutcompromising privacy, VLDB 2006
  7. Kalnis P. , Ghinita G. , Mouratidis K. , and PapadiasD. ,Preserving location-based identity inference in anonymousspatial queries, TKDE 2007
  8. Sunoh Choi, Gabriel Ghinita, Hyo-Sang Lim and Elisa Bertino, Secure kNN Query processing in Untrusted Cloud Environment, IEEE 2014
  9. Wen-Liang Hung, Shou-Jen Chang-Chien and Miin-Shen Yang, Self-updating clustering algorithm for estimating the parameters in mixtures of von Mises distributions, International Journal of Applied Statistics 2012.
  10. Sunoh Choi, Gabriel Ghinita, Hyo-Sang Lim And Elisa Bertino, "Secure Knn Query Processing In UntrustedCloud Environments",IEEE Transactions On Knowledge And Data Engineering Vol: Pp No: 99 Year 2014
Index Terms

Computer Science
Information Sciences

Keywords

Location based service point of interest mutable order preserving encoding and kNN.