Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing

9Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Since studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, a couple of privacy-preserving kNN query processing algorithms have been proposed over the encrypted database. However, the existing algorithms are either insecure or inefficient. Therefore, in this paper we propose a privacy-preserving kNN query processing algorithm via secure two-party computation on the encrypted database. Our algorithm preserves both data privacy and query privacy while hiding data access patterns. For this, we propose efficient and secure protocols based on Yao’s garbled circuit. To achieve a high degree of efficiency in query processing, we also propose a parallel kNN query processing algorithm using encrypted random value pool. Through our performance analysis, we verify that our proposed algorithms outperform the existing ones in terms of a query processing cost.

References Powered by Scopus

Public-key cryptosystems based on composite degree residuosity classes

5553Citations
N/AReaders
Get full text

Multidimensional Binary Search Trees Used for Associative Searching

5517Citations
N/AReaders
Get full text

HOW TO GENERATE AND EXCHANGE SECRETS.

3070Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SecKNN: FSS-Based Secure Multi-Party KNN Classification under General Distance Functions

5Citations
N/AReaders
Get full text

New attacks on secret sharing-based data outsourcing: toward a resistant scheme

3Citations
N/AReaders
Get full text

Privacy-Preserving Top-k Query Processing Algorithms Using Efficient Secure Protocols over Encrypted Database in Cloud Computing Environment

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kim, H. J., Lee, H., Kim, Y. K., & Chang, J. W. (2022). Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing. Journal of Supercomputing, 78(7), 9245–9284. https://doi.org/10.1007/s11227-021-04286-2

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

75%

Lecturer / Post doc 1

13%

Researcher 1

13%

Readers' Discipline

Tooltip

Computer Science 5

63%

Engineering 3

38%

Save time finding and organizing research with Mendeley

Sign up for free