PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT

One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud prom...

Full description

Saved in:
Bibliographic Details
Published inCommunications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering Vol. 61; no. 1; pp. 1 - 11
Main Authors KALIDEEN, Muhammad Rifthy, OSMANOGLU, Murat, TUGRUL, Bulent
Format Journal Article
LanguageEnglish
Published 30.06.2019
Online AccessGet full text

Cover

Loading…
More Information
Summary:One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.
ISSN:2618-6462
2618-6462
DOI:10.33769/aupse.533815