An Efficient Privacy-Preserving Randomization- Based Approach for Classification Upon Encrypted Data in Outsourced Semi-Honest Environment

被引:0
|
作者
Gaikwad, Vijayendra Sanjay [1 ,2 ]
Walse, Kishor H. [3 ]
Junaid, Mohammad Atique Mohammad [1 ,2 ]
机构
[1] St Gadge Baba Amravati Univ, PG Dept Comp Sci & Engn, Amravati, India
[2] SCTRs PICT, Pune, India
[3] St Bhagwanbaba Kala Mahavidyalaya, Sindkhed Raja, Buldana, India
关键词
Partial homomorphic encryption; classification using encrypted data; randomization; k- nearest neighbours; QUERY; SECURITY;
D O I
10.14569/IJACSA.2024.0151189
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cloud environment context, organizations often rely on the platform for data storage and on demand access. Data is typically encrypted either by the cloud service itself or by the data owners before outsourcing it to maintain confidentiality. However, when it comes to processing encrypted data for tasks like k NN classification; existing approaches either prove to be inefficient or delegate portion of the classification task to end users or do not satisfy all the privacy requirements. Also, the datasets used in many existing approaches to check the performance seem to have very less attributes and instances; but, it is observed that as dataset size increases, the efficiency and accuracy of many privacy-preserving approaches reduce significantly. In this work, we propose a set of privacy preserving protocols that collectively perform the k NN classification with encrypted data in outsourced semi-honest-cloud environment and also address the stated challenges. This is accomplished by building an efficient randomization-based approach called PPkC that leverages homomorphic cryptosystem properties. With protocol analysis we prove that the proposed approach satisfies all privacy requirements. Finally, with extensive experimentation using real-world and scaled dataset we show that the performance of proposed PPkC protocol is computationally efficient and also independent of the number of nearest neighbours considered.
引用
收藏
页码:908 / 920
页数:13
相关论文
共 50 条
  • [41] Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data
    Zhu, Hui
    Wei, Qing
    Yang, Xiaopeng
    Lu, Rongxing
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 576 - 586
  • [42] Privacy-preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys
    Li, Ye
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 548 - 555
  • [43] Communication-efficient outsourced privacy-preserving classification service using trusted processor
    Li, Tong
    Li, Xuan
    Zhong, Xingyi
    Jiang, Nan
    Gao, Chong-zhi
    INFORMATION SCIENCES, 2019, 505 : 473 - 486
  • [44] An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
    Pasupuleti, Syam Kumar
    Ramalingam, Subramanian
    Buyya, Rajkumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 12 - 22
  • [45] Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
    Feng, Jun
    Yang, Laurence T.
    Zhu, Qing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 857 - 868
  • [46] Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System
    Bomai, Abubakar
    Aldeen, Mohammed Shujaa
    Zhao, Chuan
    2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 683 - 691
  • [47] Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation over Encrypted Data
    Xu, Qi
    Zhu, Hui
    Zheng, Yandong
    Wang, Fengwei
    Lu, Rongxing
    Gao, Le
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 1603 - 1608
  • [48] Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data
    Liang, Yanrong
    Ma, Jianfeng
    Miao, Yinbin
    Su, Yuan
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9085 - 9099
  • [49] PRRkNN: Efficient and Privacy-Preserving Range-Based Reverse kNN over Encrypted Data
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Wang, Fengwei
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2300 - 2305
  • [50] A DCT-based privacy-preserving approach for efficient data mining
    Tian, Feng
    Gui, Xiaolin
    An, Jian
    Yang, Pan
    Zhang, Xuejun
    Zhao, Jianqiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3641 - 3652