Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay

被引:0
|
作者
Zhang, Jinhai [1 ]
Zhang, Junwei [1 ,2 ]
Ma, Zhuo [1 ,2 ]
Liu, Yang [1 ]
Ma, Xindi [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
k-nearest neighbor; Privacy-preserving cloud computing; Homomorphic secret sharing; Multi-party computation; NEAREST-NEIGHBOR;
D O I
10.1016/j.sysarc.2024.103111
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Online classification services based on machine learning have been widely used in fields such as healthcare and finance. To enhance the data privacy and avoid server collusion, companies usually deploy servers on different cloud service providers in distant regions separately, which implies high network delay between servers. However, many existing schemes inevitably involve a large number of communication rounds, resulting in inefficient online performance. To mitigate the negative effect of network delay, we propose an efficient and delay-robust approach for privacy-preserving k -NN classification on two non-interactive servers. Our method utilizes the state -of -the -art homomorphic secret sharing (HSS) technique and only introduces constant communication rounds. We also design an efficient self-recovery mechanism by enabling redundant cloud servers to securely back up the encrypted dataset, which is efficient even under high network delay. As the result of experiments we conducted in various network environment, our scheme is more online-efficient and is more robust to high network delay compared with related works.
引用
收藏
页数:19
相关论文
共 22 条
  • [1] Efficient and Scalable Multi-party Privacy-Preserving k-NN Classification
    Li, Xinglei
    Qian, Haifeng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023, 2025, 568 : 266 - 286
  • [2] Privacy-Preserving K-NN Classification Using Vector Operations
    Jalla, Hanumantharao
    Girija, P. N.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR COMPETITIVE STRATEGIES, 2019, 40 : 655 - 664
  • [3] An Efficient and Privacy-Preserving k-NN Query Scheme for eHealthcare Data
    Zheng, Yandong
    Lu, Rongxing
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 358 - 365
  • [4] Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
    Yandong Zheng
    Rongxing Lu
    Jun Shao
    Journal of Medical Systems, 2019, 43
  • [5] Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (05)
  • [6] Non-interactive Privacy-preserving k-NN Classifier
    Pereira, Hilder V. L.
    Aranha, Diego F.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 362 - 371
  • [7] Privacy-preserving k-NN interpolation over two encrypted databases
    Osmanoglu, Murat
    Demir, Salih
    Tugrul, Bulent
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [8] Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
    Lian, Huijuan
    Qiu, Weidong
    Yan, Di
    Huang, Zheng
    Guo, Jie
    COMPLEXITY, 2017,
  • [9] LPCQP: Lightweight Private Circular Query Protocol for Privacy-Preserving k-NN Search
    Utsunomiya, Yasuhito
    Toyoda, Kentaroh
    Sasase, Iwao
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 59 - 64
  • [10] Query Processing Using Privacy Preserving k-NN Classification Over Encrypted Data
    Vani, E.
    Veena, S.
    Aravindar, D. John
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,