Filters








697 Hits in 5.8 sec

Secure k-NN query on encrypted cloud data with multiple keys

Bulusu Rama, MLR Institute Of Technology, Hyderabad, India
2019 International Journal of Advanced Trends in Computer Science and Engineering  
it assess and identical keys, and they don't share it with one-other meantime, the DO convert and make outsourced data using it with their own key.  ...  The K-nearest neighbors (k-NN) query is a core relating for occupying space and being using many channel for communication in the database.  ...  To our facts the primary painting research released k-NN query on encrypt information with two-keys.  ... 
doi:10.30534/ijatcse/2019/82832019 fatcat:lipq62pxund4fot2xo7uacrzya

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database [chapter]

Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
2016 Lecture Notes in Computer Science  
We also show that the proposed protocol ensures the privacy and the security of the data and the query point.  ...  One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements.  ...  Secure Multiplication (SM) Protocol In the protocol, a data owner (DO) with the secret key and a cloud service provider (CSP) with the inputs E pk (a) and E pk (b) securely compute the multiplication E  ... 
doi:10.1007/978-3-319-40253-6_11 fatcat:ppa3nbm4uzcjjmugjnmiav5yia

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners

Frank Li, Richard Shin, Vern Paxson
2015 Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop - CCSW '15  
In this work, we present the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners.  ...  However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system.  ...  The other cloud party is called the key party, since it generates the keys for a public-key encryption scheme. Data tuples and queries are encrypted with the key party's public key.  ... 
doi:10.1145/2808425.2808430 dblp:conf/ccs/LiSP15 fatcat:5doyd7ar3veqnmbwowq4wfsjnq

Privacy-preserving k-NN interpolation over two encrypted databases

Murat Osmanoglu, Salih Demir, Bulent Tugrul
2022 PeerJ Computer Science  
By considering this fact, we focus on the k-nearest neighbor (k-NN) problem over two encrypted databases.  ...  However, dealing with the encrypted data makes it difficult for the cloud service providers to perform some operations over the data that will especially be required in query processing tasks.  ...  Zhu, Huang & Takagi (2016) introduced a secure protocol that achieves k-NN query processing on encrypted data without totally revealing the data owner's secret key to the query user.  ... 
doi:10.7717/peerj-cs.965 pmid:35721407 pmcid:PMC9202633 fatcat:4rxft23aefck7ptso2euvys3ru

CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING

S.Narayanan .
2016 International Journal of Research in Engineering and Technology  
In this proposed work, we focus on solving the k-NN problem over secure encrypted data by proposing a privacy preserving k-nearest neighbour classification on encrypted information in the cloud using private  ...  In the base paper, a k-NN classification algorithm over secure data under a semi-honest model was developed using a Paillier cryptosystem for public key encryption.  ...  A privacy preserving k-NN is used to classify the data based on the user's query(which is also preserved in encrypted format) and also to provide security to the encrypted data.  ... 
doi:10.15623/ijret.2016.0503034 fatcat:cbdxje4lvzcuvn6lfy7xrd5oie

Review on a Privacy-Preserving and Efficient kNearest Neighbor Model Based on k- Dimension Tree for Outsource Data

Pratiksha Bhimte, Neha Mogre
2021 International journal of innovations in engineering and science  
higher than the k-NN query scheme already in effect.  ...  So, in recent years, many functions in the k-Nearest Neighbor (indicated by k-NN) encrypted data algorithm have emerged.  ...  Our Secure k-NN solution is targeted at public clouds.  ... 
doi:10.46335/ijies.2021.6.8.3 fatcat:iudir6vyqbcybg3coedqej5jde

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners [article]

Frank Li, Richard Shin, Vern Paxson
2015 arXiv   pre-print
In this work, we present the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners.  ...  However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system.  ...  The other cloud party is called the key party, since it generates the keys for a public-key encryption scheme. Data tuples and queries are encrypted with the key party's public key.  ... 
arXiv:1507.08309v1 fatcat:7eslwnbdivf7nnxijk5wr22fje

Non-interactive Privacy-preserving k-NN Classifier

Hilder V. L. Pereira, Diego F. Aranha
2017 Proceedings of the 3rd International Conference on Information Systems Security and Privacy  
In this paper, we propose privacy-preserving versions of the k-NN classifier which operate over encrypted data, combining orderpreserving encryption and homomorphic encryption.  ...  Non-interactive Privacy-preserving k-NN Classifier.  ...  ACKNOWLEDGMENTS We thank Google Inc. for the financial support through the Latin America Research Awards "Machine learning over encrypted data using Homomorphic Encryption" and "Efficient homomorphic encryption  ... 
doi:10.5220/0006187703620371 dblp:conf/icissp/PereiraA17 fatcat:zxw47gel5vgpdnlgwrykcmaaa4

A Privacy-preserving and Efficient k-Nearest Neighbor Query and Classification Scheme Based on k-dimensional tree for Outsourced Data

Jiangyi Du, Fuling Bian
2020 IEEE Access  
Therefore, in recent years, many new works on the k-Nearest Neighbor (denoted by k-NN) algorithm for encrypted data has appeared.  ...  However, due to the severe security risks that appear in cloud computing, most organizations now encrypt data before outsourcing data.  ...  In recent years, many studies on the security of the k-NN search over the encrypted outsourced data in the cloud have been carried out and deepened.  ... 
doi:10.1109/access.2020.2986245 fatcat:gtf4lfdpwbfyvkmpkeq3pwhu5m

Multi-Keyword Search Methodology for Cloud Data

Mrs. Kavya B S, Shrilakshmi P V, Sushmitha N, Yamuna S
2017 IJARCCE  
The secure k-NN is used to encrypt index and query vector. 116 2.  ...  To maintain the privacy and delicacy of the information stored on the cloud, encryption of the data must be done. Encryption is carried out before outsourcing the data.  ...  semantic without affecting privacy, we propose a basic idea for the MRSE using secure inner product computation which is adapted from a secure k-nearest neighbor(k-NN) technique [4] .  ... 
doi:10.17148/ijarcce.2017.6422 fatcat:763amabgd5c5ralq4oaafhcwdu

A Privacy Preserving Cloud-Based K-NN Search Scheme with Lightweight User Loads

Hsu, Hsueh, Wu
2020 Computers  
The problem is about letting the cloud server find K nearest points with respect to an encrypted query on the encrypted dataset, which was outsourced by data owners, and return the searched results to  ...  In this work, a novel privacy preserving K-nearest neighbor (K-NN) search scheme over the encrypted outsourced cloud dataset is proposed.  ...  In this work, we focus on solving the K-nearest neighbor (K-NN) search problem over the encrypted dataset in the cloud.  ... 
doi:10.3390/computers9010001 fatcat:i3ltiefpbnckphjsq3cwqmwwji

Outsourcing of Secure k-Nearest Neighbours Interpolation Method

Muhammad Rifthy Kalideen, Bulent Tugrul
2018 International Journal of Advanced Computer Science and Applications  
Neither the data nor query owners want to reveal their private data to anyone. k-Nearest Neighbour (k-NN) interpolation is one of the essential algorithms to produce a prediction value for an unmeasured  ...  In our work, we will perform the k-NN method using the kd-tree and ORAM without revealing both the data-owner's and query owner's confidential data to each other or to third parties.  ...  (iii) CSP processes the query and determines the k-NN points around the query coordinate. CSP cannot compute the prediction value because all data are encrypted with the key of DO.  ... 
doi:10.14569/ijacsa.2018.090446 fatcat:fmuokqfupjdn5flslabsisxbge

Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Swathy J., Surya S.R.
2016 International Journal of Computer Applications  
This paper reviews how to perform privacy preserving k-NN classification over encrypted data in the cloud.  ...  With the increment of cloud computing users have an opportunity to offload the data and processing to the cloud, in an encrypted form.  ...  Fig. 1 . 1 Architecture of k-NN classification over semantically secured encrypted relational data Fig. 2 . 2 Information flow in secure k-nn classifications generate multiple queries and collect the  ... 
doi:10.5120/ijca2016907988 fatcat:pf22srgllbdndkhbcfusb2y2vi

SEDRES: SECURED DATA RETRIEVAL SERVICE

Tapalina Bhattasali, St. Xavier's College (Autonomous), Kolkata, India
2019 Azerbaijan Journal of High Performance Computing  
Theoretical analysis of homomorphism shows its efficiency to secure searchable index, items, and query vectors required in cloud data retrieval service.  ...  Encryption logic is proposed in such a way that encrypted cloud data could be processed without decryption. A secured retrieval service is proposed here to ensure data availability at any time.  ...  Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE transactions on dependable and secure computing, 10(4), 239-250. [12] Martınez, S., Miret, J.  ... 
doi:10.32010/26166127.2019.2.1.82.92 fatcat:q776lubmrjfadhwtsaoes5u4hu

Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality

Jung-Shian Li, I-Hsien Liu, Chin-Jui Tsai, Zhi-Yuan Su, Chu-Fen Li, Chuan-Gang Liu
2020 IEEE Access  
Hence, in this paper, we combine the opinions of HE and ASPE to propose new privacy-preserving content-based image retrieval with key confidentiality scheme against the attacks from data owner, cloud server  ...  Contrary to ASPE, HE can execute addition and multiplication in the encrypted domain and solve key leakage problem.  ...  Based on k-NN algorithm, we can find the the top-k closest descriptors around the query descriptor.  ... 
doi:10.1109/access.2020.3003928 fatcat:qupcunfvijazdahblypyxe3wnu
« Previous Showing results 1 — 15 out of 697 results