PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT
One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud prom...
Saved in:
Published in | Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering Vol. 61; no. 1; pp. 1 - 11 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
30.06.2019
|
Online Access | Get full text |
Cover
Loading…
Summary: | One
of the most emerging computer technologies of this decade is cloud computing
that allows data owners to outsource their storage and computing requirements.
It enables data owners to avoid the costs of building and maintaining a private
storage infrastructure. While outsourcing data to cloud promises significant
benefits, it possesses substantial security and privacy concerns, especially
when data stored in the cloud is sensitive and confidential, like a business
plan. Encrypting the data before outsourcing can ensure privacy. However, it
will be very difficult to process the cipher text created by the traditional
encryption method. Considering this fact, we propose an efficient protocol that
allows a query owner to retrieve the interpolation of the top k records from two
different databases that are closest to a query point. Note that the databases
are stored in two different cloud service providers in encrypted form. We also
show that the proposed protocol ensures the privacy and the security of the
data and the query point. |
---|---|
ISSN: | 2618-6462 2618-6462 |
DOI: | 10.33769/aupse.533815 |