DOI: http://dx.doi.org/10.26483/ijarcs.v8i7.4142 Volume 8, No. 7, July – August 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info © 2015-19, IJARCS All Rights Reserved 140 ISSN No. 0976-5697 ISSN No. 0976-5697 AN IMPROVEMENT OF PRIVACY PRESERVING USING BLOCK-TINY ENCRYPTION ALGORITHM: CLOUD APPROACH Himanshu Kumar School of information & technology (SoICT) Gautam Buddha University Greater Noida (U.P) Dr Anurag Singh Baghel School of information & technology (SoICT) Gautam Buddha University Greater Noida (U.P) Abstract: In this paper we have a tendency to evaluate the economical, scalable, and sensible technique for privacy-preserving K-NN search. The approach allows the wide utilization of k-nearest neighbours search in confidential situations when none of the parties reveal their info whereas they'll still hand and glove notice the closest matches. To progress Block-Tiny Encryption Algorithm(TEA-AES) privacy conserving model for conserving the privacy of the patient’s information in an exceedingly cloud aided system because the sensitive info is required to be maintained confidential and may not be discovered to public users apart from the physicians. Keywords: Cloud approach, privacy preserving, TEA, KNN, MATLAB 2014a. I.INTRODUCTION The privacy preserving for the cloud assisted system is analyzed and the advantages of the protocol are determined. Privacy protection is an important aspect in the medical systems as their high risk of sensitive individual data being exposed to the public in an unauthorized way. The personal health information is collected from the patients with attributes such as heart beat rate, blood pressure, etc. during the medical treatment in terms of both text and images. An efficient privacy preserving fully homomorphism data aggregation is proposed to support both addition and multiplication operations. The dynamic medical data mining and the image feature extraction are the only processes that require privacy preserving data aggregation [3]. The privacy in data aggregation is achieved in this scheme by a tradeoff between the functionality and the optimized efficiency. Protection considerations arise when confidential information is outsourced to the cloud. By utilizing cryptography, the cloud server (i.e. its administrator) is prevented learning content in the outsourced databases. However, will we tend to additionally stop a neighborhood administrator from taking in the database content. Also, how might we keep away from situations, for example, workers utilizing cloud applications might learn quite it's required to playing their various duties? As an illustration, a company might want to specify rules limiting request-per-day for call center staff to one hundred customer contacts. Such limitations stop download of the entire (client) information. we present in this paper is a system design that enables comfortable and versatile restriction writing. Also, in doing as such, neighborhood directors and also cloud executives don't seem to be able to amendment the access rules when an application is launched. The paradigm shift involves/results within the loss of management over information also as new security and privacy problems [6]. Consequently, caution is suggested once deploying and utilizing Cloud computing in enterprises. After all, "the primary huge issue in information security in Europe arose at the end of the 1960’s, once a Swedish organization chosen to have its information handling done by an administration agency in Germany and the information insurance legislations in each countries weren't alike. With Cloud Computing rapidly accomplishment approval, it is significant to focus the subsequent risks. As security and privacy problems square measure most vital, they must be addressed before Cloud Computing sets up a very important market share. In our work we proposed a new emerging concept namely KNN and TEA approach for data privacy preserving in cloud system [8, 9]. A. KNN in a privacy preserving K-Nearest Neighbor privacy protective model for protective the protection of the patients in a cloud power-assisted framework because the sensitive data is required to be maintained classified and may not be unconcealed to public users aside from the doctor. Hence the privacy is modified by using k-nearest neighbor to develop K-Nearest Neighbor model in such a way that security of the medical data is improved. Instead of using a threshold value for the computed correlation function, the encrypted template (T) and the encrypted medical data (P) are processed to two non-colluding cloud service providers. The physician medical templates are encrypted and are outsourced to a cloud service provider while the secret key is stored in another cloud service provider. B. TEA technique Tiny Encryption Algorithm could be a Fiestal cipher that is utilizing numerous iterations instead of sophisticated programming. one-bit modification within the plain text will conjure to thirty-two bits modification within the Cipher Text. Tiny Encryption performs terribly with efficiency on trendy computers. the straightforward implementation of TEA has created it highly regarded. Tiny Encryption was executed using reduced key size of sixty-four bits rather than 128 bit [10]. II.SYSTEM MODEL The (k-NN) technique, owing to its explainable nature, could be an easy and extremely intuitively appealing methodology to handle classification issues. However, selecting associate degree applicable distance operate for k-NN will be difficult associate degreed an inferior selection will create the classifier extremely liable to noise within the information. The great optimal of k depends upon the data; usually, greater values of k decrease the consequence of noise on the sorting, but produce boundaries between categories less distinct. a decent k may be elect by varied heuristic techniques.