PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT
Abstract
One
of the most emerging computer technologies of this decade is cloud computing
that allows data owners to outsource their storage and computing requirements.
It enables data owners to avoid the costs of building and maintaining a private
storage infrastructure. While outsourcing data to cloud promises significant
benefits, it possesses substantial security and privacy concerns, especially
when data stored in the cloud is sensitive and confidential, like a business
plan. Encrypting the data before outsourcing can ensure privacy. However, it
will be very difficult to process the cipher text created by the traditional
encryption method. Considering this fact, we propose an efficient protocol that
allows a query owner to retrieve the interpolation of the top k records from two
different databases that are closest to a query point. Note that the databases
are stored in two different cloud service providers in encrypted form. We also
show that the proposed protocol ensures the privacy and the security of the
data and the query point.
Keywords
References
- M. Armbrust, et al., A view of cloud computing, Communications of the ACM, 53/4 (2010) 50-58.
- T. Ermakova, B. Fabian, and R. Zarnekow, Security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios, Proceedings of the Nineteenth Americas Conference on Information Systems (2013).
- K. Hashizume, et al., An analysis of security issues for cloud computing, Journal of Internet Services and Applications, 4/1 (2013).
- J.J. Rodrigues, et al., Analysis of the security and privacy requirements of cloud-based electronic health records systems, Journal of Medical Internet Research, 15/8 (2013).
- M.D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software, 86/9 (2013) 2263-2268.
- K. Ren, C. Wang, and Q. Wang, Security challenges for the public cloud, IEEE Internet Computing, 16/1 (2012) 69-73.
- C. Shahabi, et al., Privacy-preserving inference of social relationships from location data: a vision paper, Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 9 (2015) 1-4.
- J. Daemen, and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer Berlin Heidelberg, (2013).
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Authors
Muhammad Rifthy Kalıdeen
This is me
0000-0001-5790-1166
Publication Date
June 30, 2019
Submission Date
November 21, 2018
Acceptance Date
December 13, 2018
Published in Issue
Year 2019 Volume: 61 Number: 1
