Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments

44Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the advent of big data era, clients lack of computational and storage resources tends to outsource data mining tasks to cloud computing providers in order to improve efficiency and save costs. Generally, different clients choose different cloud companies for the sake of security, business cooperation, location, and so on. However, due to the rise of privacy leakage issues, the data contributed by clients should be encrypted under their own keys. This paper focuses on privacy-preserving k-nearest neighbor (kNN) computation over the databases distributed among multiple cloud environments. Unfortunately, existing secure outsourcing protocols are either restricted to a single key setting or quite inefficient because of frequent client-to-server interactions, making it impractical for wide application. To address these issues, we propose a set of secure building blocks and outsourced collaborative kNN protocol. Theoretical analysis shows that our scheme not only preserves the privacy of distributed databases and kNN query but also hides access patterns in the semi-honest model. Experimental evaluation demonstrates its significant efficiency improvements compared with existing methods.

Cite

CITATION STYLE

APA

Rong, H., Wang, H. M., Liu, J., & Xian, M. (2016). Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments. IEEE Access, 4, 9589–9603. https://doi.org/10.1109/ACCESS.2016.2633544

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free