SlideShare a Scribd company logo
Secure and Efficient Skyline Queries on Encrypted Data
ABSTRACT:
Outsourcing data and computation to cloud server provides a cost-effective way to
support large scale data storage and query processing. However, due to security
and privacy concerns, sensitive data (e.g., medical records) need to be protected
from the cloud server and other unauthorized users. One approach is to outsource
encrypted data to the cloud server and have the cloud server perform query
processing on the encrypted data only. It remains a challenging task to support
various queries over encrypted data in a secure and efficient way such that the
cloud server does not gain any knowledge about the data, query, and query result.
In this paper, we study the problem of secure skyline queries over encrypted data.
The skyline query is particularly important for multi-criteria decision making but
also presents significant challenges due to its complex computations. We propose a
fully secure skyline query protocol on data encrypted using semantically-secure
encryption. As a key subroutine, we present a new secure dominance protocol,
which can be also used as a building block for other queries. Furthermore, we
demonstrate two optimizations, data partitioning and lazy merging, to further
reduce the computation load. Finally, we provide both serial and parallelized
implementations and empirically study the protocols in terms of efficiency and
scalability under different parameter settings, verifying the feasibility of our
proposedsolutions.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
Jinfei Liu, member, IEEE, Juncheng Yang, member, IEEE, Li Xiong, member,
IEEE, and Jian Pei, Fellow, IEEE, “Secure and Efficient Skyline Queries on
Encrypted Data”, IEEE Transactions on Knowledge and Data Engineering,
Volume: 31 , Issue: 7 , July 1 2019.

More Related Content

DOCX
Secure cloud storage with data dynamic using secure network coding technique
DOCX
Toward secure and dependable
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOCX
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
PPTX
Privacy preserving public auditing
Secure cloud storage with data dynamic using secure network coding technique
Toward secure and dependable
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Distributed -concurrent--and-indepe...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
JPJ1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud ...
Privacy preserving public auditing

What's hot (19)

DOCX
A secure and dynamic multi keyword ranked
PDF
A hybrid cloud approach for secure authorized deduplication
PPT
Privacy preserving public auditing for regenerating-code-based
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Towards differential query services in cost efficient clouds
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Secure cloud storage with data dynamic using secure network coding technique
DOCX
Outsourced similarity search on
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOCX
a hybrid cloud approach for secure authorized reduplications
DOCX
DOC
A hybrid cloud approach for secure authorized deduplication
PPTX
CloudBrew 2016 - Building IoT solution with Service Fabric
DOCX
enabling data integrity protection in regenerating-coding-based cloud storage...
A secure and dynamic multi keyword ranked
A hybrid cloud approach for secure authorized deduplication
Privacy preserving public auditing for regenerating-code-based
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Reliable and confidential cloud storage with efficient data forwarding functi...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Towards differential query services in cost efficient clouds
Privacy preserving public auditing for regenerating-code-based cloud storage
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Privacy preserving public auditing for regenerating-code-based cloud storage
Secure cloud storage with data dynamic using secure network coding technique
Outsourced similarity search on
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
a hybrid cloud approach for secure authorized reduplications
A hybrid cloud approach for secure authorized deduplication
CloudBrew 2016 - Building IoT solution with Service Fabric
enabling data integrity protection in regenerating-coding-based cloud storage...
Ad

Similar to Secure and efficient skyline queries on encrypted data (20)

PDF
IRJET- Secure Skyline Queries over the Encrypted Data
PDF
IRJET- Secure Data Access on Distributed Database using Skyline Queries
PDF
IRJET- E-Commerce Website using Skyline Queries
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PPT
Privacy preserving queries on encrypted data
DOCX
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
A secure and dynamic multi
DOCX
Farheen
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
PPSX
Secure and Privacy-Preserving Big-Data Processing
PDF
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
DOCX
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- E-Commerce Website using Skyline Queries
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Privacy preserving queries on encrypted data
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
A secure and dynamic multi
Farheen
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Secure and Privacy-Preserving Big-Data Processing
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Institutional Correction lecture only . . .
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
01-Introduction-to-Information-Management.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Pre independence Education in Inndia.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Institutional Correction lecture only . . .
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
01-Introduction-to-Information-Management.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Pre independence Education in Inndia.pdf
Insiders guide to clinical Medicine.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India

Secure and efficient skyline queries on encrypted data

  • 1. Secure and Efficient Skyline Queries on Encrypted Data ABSTRACT: Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Furthermore, we demonstrate two optimizations, data partitioning and lazy merging, to further reduce the computation load. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposedsolutions. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 2.  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL REFERENCE: Jinfei Liu, member, IEEE, Juncheng Yang, member, IEEE, Li Xiong, member, IEEE, and Jian Pei, Fellow, IEEE, “Secure and Efficient Skyline Queries on Encrypted Data”, IEEE Transactions on Knowledge and Data Engineering, Volume: 31 , Issue: 7 , July 1 2019.