RSSMSO Rapid Similarity Search on Metric Space Object Stored in Cloud Environment

This paper involves a cloud computing environment in which the dataowner outsource the similarity search service to a third party service provider. Privacy of the outsourced data is important because they may be confidential data. The data should be made available to the authorized client groups, but not to be revealed to the service provider in which the data is stored. Given this scenario, the paper presents a technique called RSSMSO which has build phase, query phase, data transformation and search phase. The build phase and the query phase are about uploading the data and querying the data respectively; the data transformation phase transforms the data before submitting it to the service provider for similarity queries on the transformed data; search phase involves searching similar object with respect to query object. The RSSMSO technique provides enhanced query accuracy with low communication cost. Experiments have been carried out on real data sets which exhibits that the proposed work is capable of providing privacy and achieving accuracy at a low cost in comparison with FDH

[1]  K. Mala,et al.  Similarity search on metric data of outsourced lung images , 2013, 2013 International Conference on Green High Performance Computing (ICGHPC).

[2]  R. Buyya,et al.  MSSS : Most Significant Single-keyword Search over Encrypted Cloud Data , 2015 .

[3]  Gavin Sherlock,et al.  Implementation of GenePattern within the Stanford Microarray Database , 2008, Nucleic Acids Res..

[4]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[5]  Zhihua Xia,et al.  Enabling Similarity Search over Encrypted Images in Cloud , 2014 .

[6]  George M. Church,et al.  Biclustering of Expression Data , 2000, ISMB.

[7]  K Shaila,et al.  MSSS: Most Significant Single-keyword Search over Encrypted Cloud Data , 2015 .

[8]  Stepan Kozak,et al.  Efficiency and Security in Similarity Cloud Services , 2013, Proc. VLDB Endow..

[9]  Pavel Zezula,et al.  Similarity Search: The Metric Space Approach (Advances in Database Systems) , 2005 .

[10]  Klemens Böhm,et al.  Proceedings of the International Conference on Very Large Data Bases , 2005 .

[11]  Vishal R. Shinde,et al.  Outsourced Similarity Search on Metric Data Assets , 2014 .

[12]  Yasin Abbasi-Yadkori,et al.  Fast Approximate Nearest-Neighbor Search with k-Nearest Neighbor Graph , 2011, IJCAI.

[13]  Alexey Tsymbal,et al.  Towards cloud-based image-integrated similarity search in big data , 2014, IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI).

[14]  Z. Meral Özsoyoglu,et al.  Indexing large metric spaces for similarity search queries , 1999, TODS.

[15]  Cyrus Shahabi,et al.  Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.

[16]  Pasquale Savino,et al.  Approximate similarity search in metric spaces using inverted files , 2008, Infoscale.

[17]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[18]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[19]  Renée J. Miller,et al.  Similarity search over time-series data using wavelets , 2002, Proceedings 18th International Conference on Data Engineering.

[20]  Zhihua Xia,et al.  Secure semantic expansion based search over encrypted cloud data supporting similarity ranking , 2014, Journal of Cloud Computing.

[21]  Beng Chin Ooi,et al.  Hierarchical Indexing Structure for Efficient Similarity Search in Video Retrieval , 2006, IEEE Transactions on Knowledge and Data Engineering.

[22]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[23]  Miyoung Jang,et al.  A k-Nearest Neighbor Search Algorithm for Enhancing Data Privacy in Outsourced Spatial Databases , 2013 .

[24]  Yi Zhu,et al.  A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation , 2013 .

[25]  Piyush Kumar,et al.  Fast construction of k-nearest neighbor graphs for point clouds , 2010, IEEE Transactions on Visualization and Computer Graphics.

[26]  Muthu Ramachandran,et al.  Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.

[27]  Beng Chin Ooi,et al.  Indexing high-dimensional data for efficient in-memory similarity search , 2005, IEEE Transactions on Knowledge and Data Engineering.

[28]  Samir Khuller,et al.  Achieving anonymity via clustering , 2006, PODS '06.

[29]  Mauricio Marín,et al.  Load Balancing Query Processing in Metric-Space Similarity Search , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[30]  Hanan Samet,et al.  Index-driven similarity search in metric spaces (Survey Article) , 2003, TODS.

[31]  P. M. Sharp,et al.  The metric space approach to quantum mechanics , 2015 .

[32]  David Novak,et al.  Secure Metric-Based Index for Similarity Cloud , 2012, Secure Data Management.

[33]  Min Yoon,et al.  A k-Nearest Neighbor Search Algorithm for Privacy Preservation in Outsourced Spatial Databases , 2013 .