Cargando…

Privacy-preserving k-NN interpolation over two encrypted databases

Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependenc...

Descripción completa

Detalles Bibliográficos
Autores principales: Osmanoglu, Murat, Demir, Salih, Tugrul, Bulent
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9202633/
https://www.ncbi.nlm.nih.gov/pubmed/35721407
http://dx.doi.org/10.7717/peerj-cs.965
_version_ 1784728572145958912
author Osmanoglu, Murat
Demir, Salih
Tugrul, Bulent
author_facet Osmanoglu, Murat
Demir, Salih
Tugrul, Bulent
author_sort Osmanoglu, Murat
collection PubMed
description Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns. Outsourcing data to a cloud service provider in encrypted form may help to overcome these concerns. However, dealing with the encrypted data makes it difficult for the cloud service providers to perform some operations over the data that will especially be required in query processing tasks. Among the techniques employed in query processing task, the k-nearest neighbor method draws attention due to its simplicity and efficiency, particularly on massive data sets. A number of k-nearest neighbor algorithms for query processing task on a single encrypted database have been proposed. However, the performance of k-nearest neighbor algorithms on a single database may create accuracy and reliability problems. It is a fact that collaboration among different cloud service providers yields more accurate and more reliable results in query processing. By considering this fact, we focus on the k-nearest neighbor (k-NN) problem over two encrypted databases. We introduce a secure two-party k-NN interpolation protocol that enables a query owner to extract the interpolation of the k-nearest neighbors of a query point from two different databases outsourced to two different cloud service providers. We also show that our protocol protects the confidentiality of the data and the query point, and hides data access patterns. Furthermore, we conducted a number of experiment to demonstrate the efficiency of our protocol. The results show that the running time of our protocol is linearly dependent on both the number of nearest neighbours and data size.
format Online
Article
Text
id pubmed-9202633
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-92026332022-06-17 Privacy-preserving k-NN interpolation over two encrypted databases Osmanoglu, Murat Demir, Salih Tugrul, Bulent PeerJ Comput Sci Cryptography Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns. Outsourcing data to a cloud service provider in encrypted form may help to overcome these concerns. However, dealing with the encrypted data makes it difficult for the cloud service providers to perform some operations over the data that will especially be required in query processing tasks. Among the techniques employed in query processing task, the k-nearest neighbor method draws attention due to its simplicity and efficiency, particularly on massive data sets. A number of k-nearest neighbor algorithms for query processing task on a single encrypted database have been proposed. However, the performance of k-nearest neighbor algorithms on a single database may create accuracy and reliability problems. It is a fact that collaboration among different cloud service providers yields more accurate and more reliable results in query processing. By considering this fact, we focus on the k-nearest neighbor (k-NN) problem over two encrypted databases. We introduce a secure two-party k-NN interpolation protocol that enables a query owner to extract the interpolation of the k-nearest neighbors of a query point from two different databases outsourced to two different cloud service providers. We also show that our protocol protects the confidentiality of the data and the query point, and hides data access patterns. Furthermore, we conducted a number of experiment to demonstrate the efficiency of our protocol. The results show that the running time of our protocol is linearly dependent on both the number of nearest neighbours and data size. PeerJ Inc. 2022-05-31 /pmc/articles/PMC9202633/ /pubmed/35721407 http://dx.doi.org/10.7717/peerj-cs.965 Text en © 2022 Osmanoglu et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Cryptography
Osmanoglu, Murat
Demir, Salih
Tugrul, Bulent
Privacy-preserving k-NN interpolation over two encrypted databases
title Privacy-preserving k-NN interpolation over two encrypted databases
title_full Privacy-preserving k-NN interpolation over two encrypted databases
title_fullStr Privacy-preserving k-NN interpolation over two encrypted databases
title_full_unstemmed Privacy-preserving k-NN interpolation over two encrypted databases
title_short Privacy-preserving k-NN interpolation over two encrypted databases
title_sort privacy-preserving k-nn interpolation over two encrypted databases
topic Cryptography
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9202633/
https://www.ncbi.nlm.nih.gov/pubmed/35721407
http://dx.doi.org/10.7717/peerj-cs.965
work_keys_str_mv AT osmanoglumurat privacypreservingknninterpolationovertwoencrypteddatabases
AT demirsalih privacypreservingknninterpolationovertwoencrypteddatabases
AT tugrulbulent privacypreservingknninterpolationovertwoencrypteddatabases