Abstract

Cloud computing technology has attracted the attention of researchers and organizations due to its computing power, computing efficiency and flexibility. Using cloud computing technology to analysis outsourced data has become a new data utilization model. However, due to the severe security risks that appear in cloud computing, most organizations now encrypt data before outsourcing data. Therefore, in recent years, many new works on the k-Nearest Neighbor (denoted by k-NN) algorithm for encrypted data has appeared. However, two main problems are existing in the current research: either the program is not secure enough or inefficient. In this paper, based on the existing problems, we design a non-interactive privacy-preserving k-NN query and classification scheme. Our proposed scheme uses two existing encryption schemes: Order Preserving Encryption and the Paillier cryptosystem, to preserve the confidentiality of encrypted outsourced data, data access patterns, and the query record, and utilizes the encrypted the k-dimensional tree (denoted by kd-tree) to optimize the traditional k-NN algorithm. Our proposed scheme strives to achieve high query efficiency while ensuring data security. Extensive experimental results prove that this scheme is very close to the scheme using plaintext data and the existing non-interactive encrypted data query scheme in terms of classification accuracy. The query runtime of our scheme is superior to the existing non-interactive k-NN query scheme.

Highlights

  • INTRODUCTIONMachine learning and cloud computing have been widely used. Machine learning can mine hidden knowledge or patterns from massive data and is one of the most attractive technologies

  • Nowadays, machine learning and cloud computing have been widely used

  • The k-Nearest Neighbor algorithm is one of the classic machine learning algorithms, which can find the nearest k points from a large-scale data set based on a test object

Read more

Summary

INTRODUCTION

Machine learning and cloud computing have been widely used. Machine learning can mine hidden knowledge or patterns from massive data and is one of the most attractive technologies. Bian: Privacy-Preserving and Efficient k-Nearest Neighbor Query and Classification Scheme They usually encrypt all data (especially privacy information). With encrypted data outsourced to the cloud, it is no longer easy to perform any machine learning task efficiently and securely. This q can be sent to the cloud, which can calculate the class label of q to determine the risk level.

RELATED WORK
THE PAILLIER CRYPTOSYSTEM
SYSTEM MODEL
THE PROPOSED PROTOCOLS
STAGE 1
STAGE 2
EXPERIMENTAL RESULTS
CONCLUSION AND FUTURE WORKS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.