Cargando…
Privacy-preserving k-NN interpolation over two encrypted databases
Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependenc...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9202633/ https://www.ncbi.nlm.nih.gov/pubmed/35721407 http://dx.doi.org/10.7717/peerj-cs.965 |
_version_ | 1784728572145958912 |
---|---|
author | Osmanoglu, Murat Demir, Salih Tugrul, Bulent |
author_facet | Osmanoglu, Murat Demir, Salih Tugrul, Bulent |
author_sort | Osmanoglu, Murat |
collection | PubMed |
description | Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns. Outsourcing data to a cloud service provider in encrypted form may help to overcome these concerns. However, dealing with the encrypted data makes it difficult for the cloud service providers to perform some operations over the data that will especially be required in query processing tasks. Among the techniques employed in query processing task, the k-nearest neighbor method draws attention due to its simplicity and efficiency, particularly on massive data sets. A number of k-nearest neighbor algorithms for query processing task on a single encrypted database have been proposed. However, the performance of k-nearest neighbor algorithms on a single database may create accuracy and reliability problems. It is a fact that collaboration among different cloud service providers yields more accurate and more reliable results in query processing. By considering this fact, we focus on the k-nearest neighbor (k-NN) problem over two encrypted databases. We introduce a secure two-party k-NN interpolation protocol that enables a query owner to extract the interpolation of the k-nearest neighbors of a query point from two different databases outsourced to two different cloud service providers. We also show that our protocol protects the confidentiality of the data and the query point, and hides data access patterns. Furthermore, we conducted a number of experiment to demonstrate the efficiency of our protocol. The results show that the running time of our protocol is linearly dependent on both the number of nearest neighbours and data size. |
format | Online Article Text |
id | pubmed-9202633 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-92026332022-06-17 Privacy-preserving k-NN interpolation over two encrypted databases Osmanoglu, Murat Demir, Salih Tugrul, Bulent PeerJ Comput Sci Cryptography Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns. Outsourcing data to a cloud service provider in encrypted form may help to overcome these concerns. However, dealing with the encrypted data makes it difficult for the cloud service providers to perform some operations over the data that will especially be required in query processing tasks. Among the techniques employed in query processing task, the k-nearest neighbor method draws attention due to its simplicity and efficiency, particularly on massive data sets. A number of k-nearest neighbor algorithms for query processing task on a single encrypted database have been proposed. However, the performance of k-nearest neighbor algorithms on a single database may create accuracy and reliability problems. It is a fact that collaboration among different cloud service providers yields more accurate and more reliable results in query processing. By considering this fact, we focus on the k-nearest neighbor (k-NN) problem over two encrypted databases. We introduce a secure two-party k-NN interpolation protocol that enables a query owner to extract the interpolation of the k-nearest neighbors of a query point from two different databases outsourced to two different cloud service providers. We also show that our protocol protects the confidentiality of the data and the query point, and hides data access patterns. Furthermore, we conducted a number of experiment to demonstrate the efficiency of our protocol. The results show that the running time of our protocol is linearly dependent on both the number of nearest neighbours and data size. PeerJ Inc. 2022-05-31 /pmc/articles/PMC9202633/ /pubmed/35721407 http://dx.doi.org/10.7717/peerj-cs.965 Text en © 2022 Osmanoglu et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Cryptography Osmanoglu, Murat Demir, Salih Tugrul, Bulent Privacy-preserving k-NN interpolation over two encrypted databases |
title | Privacy-preserving k-NN interpolation over two encrypted databases |
title_full | Privacy-preserving k-NN interpolation over two encrypted databases |
title_fullStr | Privacy-preserving k-NN interpolation over two encrypted databases |
title_full_unstemmed | Privacy-preserving k-NN interpolation over two encrypted databases |
title_short | Privacy-preserving k-NN interpolation over two encrypted databases |
title_sort | privacy-preserving k-nn interpolation over two encrypted databases |
topic | Cryptography |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9202633/ https://www.ncbi.nlm.nih.gov/pubmed/35721407 http://dx.doi.org/10.7717/peerj-cs.965 |
work_keys_str_mv | AT osmanoglumurat privacypreservingknninterpolationovertwoencrypteddatabases AT demirsalih privacypreservingknninterpolationovertwoencrypteddatabases AT tugrulbulent privacypreservingknninterpolationovertwoencrypteddatabases |