Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users

被引:0
|
作者
Shankar, K. [1 ]
Ilayaraja, M. [1 ]
机构
[1] Kalasalingam Univ, Sch Comp, Krishnankoil 626126, Tamil Nadu, India
关键词
Cloud Computing; Privacy; k-NN; query; Homomorphic Encryption; Optimization; MODEL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, research on security issues among outsourced encrypted data is trending topic. It has broad applications in area-based management, classification, and clustering. As any other normal utilized query for online applications, secure k-Nearest Neighbors (k-NN) calculation on encrypted cloud data is highly being considered now a days, and a few advanced answers have been produced. This paper proposed an innovative plan for encrypting the outsourced database and query points. The new plan can adequately support k-Nearest Neighbor (KNN) computation while preserving data privacy and query privacy. To improve the performance of the system, the Opposition-based Particle Swarm Optimization (OPSO) optimization algorithm is utilized to secure the data by Homomorphic Encryption (HE) method. The broad hypothetical and test assessments exhibit the adequacy of our plan with regards to security and performance.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
    Cheng, Ke
    Wang, Liangmin
    Shen, Yulong
    Wang, Hua
    Wang, Yongzhi
    Jiang, Xiaohong
    Zhong, Hong
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 689 - 702
  • [2] Secure and controllable k-NN query over encrypted cloud data with key confidentiality
    Zhu, Youwen
    Huang, Zhiqiu
    Takagi, Tsuyoshi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016, 89 : 1 - 12
  • [3] Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner
    Zhu, Youwen
    Wang, Zhikuan
    Zhang, Yue
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2016, PT II, 2016, 9652 : 401 - 414
  • [4] Secure k-NN query on encrypted cloud database without key-sharing
    Zhu, Youwen
    Xu, Rui
    Takagi, Tsuyoshi
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 201 - 217
  • [5] A k-NN Query Method Over Encrypted Data
    Zhang, Zhiqiang
    Xin, Lijie
    Xie, Xiaoqin
    Pan, Haiwei
    [J]. PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 164 - 171
  • [6] Secure Parallel Processing on Encrypted Cloud Data Using Fully Homomorphic Encryption
    Patil, Rudragoud S.
    Biradar, Prabhuling
    [J]. PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 242 - 247
  • [7] Secure and Non-interactive k-NN Classifier Using Symmetric Fully Homomorphic Encryption
    Ameur, Yulliwas
    Aziz, Rezak
    Audigier, Vincent
    Bouzefrane, Samia
    [J]. PRIVACY IN STATISTICAL DATABASES, PSD 2022, 2022, 13463 : 142 - 154
  • [8] Query Processing Using Privacy Preserving k-NN Classification Over Encrypted Data
    Vani, E.
    Veena, S.
    Aravindar, D. John
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [9] Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
    Zhou, Lu
    Zhu, Youwen
    Castiglione, Aniello
    [J]. COMPUTERS & SECURITY, 2017, 69 : 84 - 96
  • [10] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160