Sunteți pe pagina 1din 9

Authenticated Multistep Nearest Neighbor Search

By Ujwala Bhoga 10H61D2511

Abstract
Multistep processing is used for nearest neighbor (NN) in applications involving high-dimensional data and/or costly distance computations. In this , clients issue NN queries to a server that maintains a database signed by a trusted authority. The server returns the NN set along with supplementary information that permits result verification using the data set signature. An adaptation of the multistep NN algorithm incurs prohibitive network overhead due to the transmission of false hits, i.e., records that are not in the NN set, but are nevertheless necessary for its verification. In order to alleviate this problem, we present a novel technique that reduces the size of each false hit..

Introduction
In this paper, we focus on authenticated multistep NN search for applications that require a proof of result correctness.

Existing System:
Several applications including image, medical, and Document Databases involve high dimensional data.
The system considers the query which is processing under the Nearest Neighbor but it is not an authenticated because its providing the result-set with nearest data only.

Existing system Disadvantages:


The data set is not authenticated.

Unable to use the public key cryptosystem.


We have to search the nearest result accurately.

Proposed System:
The system provides the authentication .A server maintains a dataset DB signed by a trusted authority. The signature is usually based on a public key cryptosystem. The server receives and processed queries from clients. Since the signature captures the entire database and the server returns the verification objects then the clients can verify result set based on signature and the signers public key. In order to make easier this problem, we present a novel technique that reduces the size of each false hit.

Advantages:
The system provides the result-set that result-set is accurate one. Using a public key Cryptosystem, the system provides the result-set is fully authenticated to the user can visible with his signature.

Algorithms to be Used
Multi-Step Nearest Neighbor Algorithm Authenticated Multi-step NN Algorithm Algorithm to Reduce FalseHit

Than You

S-ar putea să vă placă și