Abstract

One
 of the most emerging computer technologies of this decade is cloud computing
 that allows data owners to outsource their storage and computing requirements.
 It enables data owners to avoid the costs of building and maintaining a private
 storage infrastructure. While outsourcing data to cloud promises significant
 benefits, it possesses substantial security and privacy concerns, especially
 when data stored in the cloud is sensitive and confidential, like a business
 plan. Encrypting the data before outsourcing can ensure privacy. However, it
 will be very difficult to process the cipher text created by the traditional
 encryption method. Considering this fact, we propose an efficient protocol that
 allows a query owner to retrieve the interpolation of the top k records from two
 different databases that are closest to a query point. Note that the databases
 are stored in two different cloud service providers in encrypted form. We also
 show that the proposed protocol ensures the privacy and the security of the
 data and the query point.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call