Abstract
Cloud services with powerful resources are popularly used to manage exponentially increasing data and to carry out data mining to analyze the data. However, a data mining involving query can cause privacy problems by disclosing both the data and the query. One task in data mining, classification, is used in a wide range of applications, and we focus on $k$ -nearest neighbor ( $k$ NN) in this study to realize classification. Although several studies have already attempted to address the privacy problems associated with $k$ NN computation in a cloud environment, the results of these studies are still inefficient. In this paper, we propose a very efficient and privacy-preserving $k$ NN classification ( $\text{P}k$ NC) over encrypted data. While the amount of computation (encryptions/decryptions and exponentiations) and communication of the most efficient $k$ NN classification proposed in prior studies is bounded by $O(kln)$ , that of the proposed $\text{P}k$ NC is bounded by $O(ln)$ , where $l$ is the domain size of data and $n$ is the number of data. When conducting experiments with the same dataset, the prior $k$ NN classification took 12.02 to 55.5 minutes but $\text{P}k$ NC took 4.16 minutes. Furthermore, since $\text{P}k$ NC allows to be carried out in parallel for each data, its performance can be improved extremely if it is carried out on machine to allow more numerous threads. $\text{P}k$ NC protects the privacy of dataset, input query including the $k$ NN result, and does not disclose any data access patterns. We propose several protocols to serve as building blocks to construct $\text{P}k$ NC and formally prove their security. In particular, we propose efficient protocols that privately find $k$ largest or smallest elements in array.
Highlights
As the era of the Internet of Things (IoT) progresses, cloud services with powerful resources are popularly used to efficiently manage exponentially increasing data [1]
PRIVACY-PRESERVING k-NEAREST NEIGHBOR CLASSIFICATION (PkNC) data host (DH) and cryptographic service provider (CSP) carry out preserving kNN classification (PkNC) for a query of querier based on dataset of a data owner and send its resultant class label back to the querier
We focused on efficient privacy-preserving kNN (PPkNN) to realize classification as one of data mining tasks and proposed efficient PkNC to allow to be run in parallel
Summary
As the era of the Internet of Things (IoT) progresses, cloud services with powerful resources are popularly used to efficiently manage exponentially increasing data [1]. Similar to the work of [11], PPkNN in [17] protects privacy of query and its result, but it leaks dataset information by disclosing all class labels of the k data. PPkNN in [10] protects the privacy of dataset, query, and its kNN classification result which are proved formally, and it is relatively efficient. We focus on designing a practically efficient PPkNN over encrypted dataset and query which protects the privacy of dataset, query including kNN result and hides data access patterns. As for security of PkNC, it protects the privacy of dataset, query including kNN classification result, and conceals data access patterns even from cloud servers to carry out PkNC. The number of communication rounds refers to the communication count carried out in parallel
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.