Outsourcing of secure k-nearest neighbours interpolation method

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing becomes essential in these days for the enterprises. Most of the large companies are moving their services and data to the cloud servers which offer flexibility and efficiency. Data owner (DO) hires a cloud service provider (CSP) to store its data and carry out the related computation. The query owner (QO) sends a request which is crucial for its future plans to the CSP. The CSP computes all necessary calculations and returns the result back to the QO. Neither the data nor query owners want to reveal their private data to anyone. k-Nearest Neighbour (k-NN) interpolation is one of the essential algorithms to produce a prediction value for an unmeasured location. Simply, it finds k number of nearest neighbours around the query point to produce an output. Oblivious RAM (ORAM) has been used to protect the privacy in cloud computing. In our work, we will perform the k-NN method using the kd-tree and ORAM without revealing both the data-owner's and query owner's confidential data to each other or to third parties. The proposed solution will be analysed to ensure that it provides accurate and reliable predictions while preserving the privacy of all parties.

Cite

CITATION STYLE

APA

Kalideen, M. R., & Tugrul, B. (2018). Outsourcing of secure k-nearest neighbours interpolation method. International Journal of Advanced Computer Science and Applications, 9(4), 319–323. https://doi.org/10.14569/IJACSA.2018.090446

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free