Research Article

PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT

Volume: 61 Number: 1 June 30, 2019
EN

PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT

Abstract

One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.

Keywords

References

  1. M. Armbrust, et al., A view of cloud computing, Communications of the ACM, 53/4 (2010) 50-58.
  2. T. Ermakova, B. Fabian, and R. Zarnekow, Security and privacy system requirements for adopting cloud computing in healthcare data sharing scenarios, Proceedings of the Nineteenth Americas Conference on Information Systems (2013).
  3. K. Hashizume, et al., An analysis of security issues for cloud computing, Journal of Internet Services and Applications, 4/1 (2013).
  4. J.J. Rodrigues, et al., Analysis of the security and privacy requirements of cloud-based electronic health records systems, Journal of Medical Internet Research, 15/8 (2013).
  5. M.D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software, 86/9 (2013) 2263-2268.
  6. K. Ren, C. Wang, and Q. Wang, Security challenges for the public cloud, IEEE Internet Computing, 16/1 (2012) 69-73.
  7. C. Shahabi, et al., Privacy-preserving inference of social relationships from location data: a vision paper, Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 9 (2015) 1-4.
  8. J. Daemen, and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer Berlin Heidelberg, (2013).

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

June 30, 2019

Submission Date

November 21, 2018

Acceptance Date

December 13, 2018

Published in Issue

Year 2019 Volume: 61 Number: 1

APA
Kalıdeen, M. R., Osmanoglu, M., & Tugrul, B. (2019). PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering, 61(1), 1-11. https://doi.org/10.33769/aupse.533815
AMA
1.Kalıdeen MR, Osmanoglu M, Tugrul B. PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. 2019;61(1):1-11. doi:10.33769/aupse.533815
Chicago
Kalıdeen, Muhammad Rifthy, Murat Osmanoglu, and Bulent Tugrul. 2019. “PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 61 (1): 1-11. https://doi.org/10.33769/aupse.533815.
EndNote
Kalıdeen MR, Osmanoglu M, Tugrul B (June 1, 2019) PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 61 1 1–11.
IEEE
[1]M. R. Kalıdeen, M. Osmanoglu, and B. Tugrul, “PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT”, Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng., vol. 61, no. 1, pp. 1–11, June 2019, doi: 10.33769/aupse.533815.
ISNAD
Kalıdeen, Muhammad Rifthy - Osmanoglu, Murat - Tugrul, Bulent. “PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering 61/1 (June 1, 2019): 1-11. https://doi.org/10.33769/aupse.533815.
JAMA
1.Kalıdeen MR, Osmanoglu M, Tugrul B. PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. 2019;61:1–11.
MLA
Kalıdeen, Muhammad Rifthy, et al. “PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT”. Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering, vol. 61, no. 1, June 2019, pp. 1-11, doi:10.33769/aupse.533815.
Vancouver
1.Muhammad Rifthy Kalıdeen, Murat Osmanoglu, Bulent Tugrul. PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT. Commun.Fac.Sci.Univ.Ank.Series A2-A3: Phys.Sci. and Eng. 2019 Jun. 1;61(1):1-11. doi:10.33769/aupse.533815

Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License