Efficient Secure k-Nearest Neighbours over Encrypted Data
نویسندگان
چکیده
Enterprise customers of cloud services are wary of outsourcing sensitive user and business data due to inherent security and privacy concerns. In this context, storing and computing directly on encrypted data is an attractive solution, especially against insider attacks. Homomorphic encryption, the keystone enabling technology is unfortunately prohibitively expensive. In this paper, we focus on finding k-Nearest Neighbours (k-NN) directly on encrypted data, a basic data-mining and machine learning algorithm. The goal is to compute the nearest neighbours to a given query, and present exact results to the clients, without the cloud learning anything about the data, query, results, or the access and search patterns. We describe a novel protocol in the two-party cloud setting, using an underlying somewhat homomorphic encryption scheme. In comparison to the state-of-the-art protocol in this setting, we provide asymptotically faster performance, without sacrificing any security guarantees. We implemented our protocol to demonstrate that it is efficient and practical on large and relevant real-world datasets and study how it scales well across different parameters on simulated data.
منابع مشابه
Secure k-NN query on encrypted cloud database without key-sharing
In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the ent...
متن کاملEfficient Encrypted Data Comparison Through a Hybrid Method
With the development of smart city, user data are all transformed in encrypted form to protect user privacy. Secure comparison in encrypted form is the fundamental operation of many secure encrypted data analysis tasks, such as secure k-NN query and classification, Bayesian classification. Thus, it is important to achieve an efficient secure encrypted data comparison scheme. Recently, some meth...
متن کاملk-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...
متن کاملSecure Encrypted Relational Data with using K-Nn Classification
With the recent quality of cloud computing, users currently have the chance to source their information, in encrypted kind, still because the data processing tasks to the cloud. Since the info on the cloud is in encrypted kind, existing privacy-preserving classification techniques aren't applicable. During this paper, we tend to target resolution the classification drawback over encrypted infor...
متن کاملK-Nearest Neighbor Categorization on Secure Data Access in Cloud
For the last few years, a extensive research has been going on query processing of relation data and more practical and theoretical solution have been suggested to query processing under different scenarios. Now days cloud computing technology is increasing rapidly, so users now have the chance to store their data in remote location. However, different privacy issues are raised on cloud computi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018