PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT
One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud prom...
Saved in:
Published in | Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering Vol. 61; no. 1; pp. 1 - 11 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
30.06.2019
|
Online Access | Get full text |
Cover
Loading…
Abstract | One
of the most emerging computer technologies of this decade is cloud computing
that allows data owners to outsource their storage and computing requirements.
It enables data owners to avoid the costs of building and maintaining a private
storage infrastructure. While outsourcing data to cloud promises significant
benefits, it possesses substantial security and privacy concerns, especially
when data stored in the cloud is sensitive and confidential, like a business
plan. Encrypting the data before outsourcing can ensure privacy. However, it
will be very difficult to process the cipher text created by the traditional
encryption method. Considering this fact, we propose an efficient protocol that
allows a query owner to retrieve the interpolation of the top k records from two
different databases that are closest to a query point. Note that the databases
are stored in two different cloud service providers in encrypted form. We also
show that the proposed protocol ensures the privacy and the security of the
data and the query point. |
---|---|
AbstractList | One
of the most emerging computer technologies of this decade is cloud computing
that allows data owners to outsource their storage and computing requirements.
It enables data owners to avoid the costs of building and maintaining a private
storage infrastructure. While outsourcing data to cloud promises significant
benefits, it possesses substantial security and privacy concerns, especially
when data stored in the cloud is sensitive and confidential, like a business
plan. Encrypting the data before outsourcing can ensure privacy. However, it
will be very difficult to process the cipher text created by the traditional
encryption method. Considering this fact, we propose an efficient protocol that
allows a query owner to retrieve the interpolation of the top k records from two
different databases that are closest to a query point. Note that the databases
are stored in two different cloud service providers in encrypted form. We also
show that the proposed protocol ensures the privacy and the security of the
data and the query point. |
Author | KALIDEEN, Muhammad Rifthy TUGRUL, Bulent OSMANOGLU, Murat |
Author_xml | – sequence: 1 givenname: Muhammad Rifthy orcidid: 0000-0001-5790-1166 surname: KALIDEEN fullname: KALIDEEN, Muhammad Rifthy – sequence: 2 givenname: Murat orcidid: 0000-0001-8693-141X surname: OSMANOGLU fullname: OSMANOGLU, Murat – sequence: 3 givenname: Bulent orcidid: 0000-0003-4719-4298 surname: TUGRUL fullname: TUGRUL, Bulent |
BookMark | eNpNkE1PwjAcxhuDiYgcvfcLFNv92247zlGhEdpldERPSze6hESBbPHAt5eAB0_PS548h98jGh2Oh4DQM6MzgFimL_7nNISZAEiYuEPjSLKESC6j0T__gKbDsG8o5zEAiGiMPopSb7P8kxSl2qhyq80CvxOjskt02Ci9WL7aqsTaOFUWdpU5bQ1eK7e080uJM4Nt5TaXSa7mWJmtLq1ZK-Oe0H3nv4Yw_dMJqt6Uy5dkZRc6z1akZYILsou84CmTLZeBd53ftS00gYskocBANFJwL1IIIhY02Ukep00SU8EpY5RGvoEJIrfftj8OQx-6-tTvv31_rhmtr2TqK5n6RgZ-Ae_9UQE |
CitedBy_id | crossref_primary_10_7717_peerj_cs_965 |
Cites_doi | 10.2196/jmir.2494 10.1145/2484402.2484415 10.1145/2820783.2820880 10.1007/s00778-011-0245-7 10.1145/1559845.1559862 10.1016/j.jnca.2016.04.001 10.1109/ICDE.2014.6816690 10.1109/ICDCS.2008.79 10.1186/1869-0238-4-5 10.1145/1376616.1376631 10.1007/978-3-319-12229-8 10.1007/978-0-387-88735-7_10 10.1145/1721654.1721672 10.1016/B978-012088469-8.50064-4 10.1016/j.jss.2012.12.025 10.1109/ICDE.2011.5767862 10.1109/ICDE.2013.6544870 10.1007/3-540-45811-5_37 10.1109/MIC.2012.14 10.1007/11805588_7 10.1007/978-3-540-24571-1_10 10.14569/IJACSA.2018.090446 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.33769/aupse.533815 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2618-6462 |
EndPage | 11 |
ExternalDocumentID | 10_33769_aupse_533815 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION M~E |
ID | FETCH-LOGICAL-c1545-d2a54916c46e4ffadcc3be458803135b654a593e57508d6479b87054011002ab3 |
ISSN | 2618-6462 |
IngestDate | Fri Aug 23 02:35:33 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c1545-d2a54916c46e4ffadcc3be458803135b654a593e57508d6479b87054011002ab3 |
ORCID | 0000-0001-5790-1166 0000-0001-8693-141X 0000-0003-4719-4298 |
OpenAccessLink | https://dergipark.org.tr/en/download/article-file/660330 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_33769_aupse_533815 |
PublicationCentury | 2000 |
PublicationDate | 2019-06-30 |
PublicationDateYYYYMMDD | 2019-06-30 |
PublicationDate_xml | – month: 06 year: 2019 text: 2019-06-30 day: 30 |
PublicationDecade | 2010 |
PublicationTitle | Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering |
PublicationYear | 2019 |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref4 doi: 10.2196/jmir.2494 – ident: ref20 doi: 10.1145/2484402.2484415 – ident: ref7 doi: 10.1145/2820783.2820880 – ident: ref14 doi: 10.1007/s00778-011-0245-7 – ident: ref10 doi: 10.1145/1559845.1559862 – ident: ref13 doi: 10.1016/j.jnca.2016.04.001 – ident: ref26 doi: 10.1109/ICDE.2014.6816690 – ident: ref11 doi: 10.1109/ICDCS.2008.79 – ident: ref3 doi: 10.1186/1869-0238-4-5 – ident: ref24 doi: 10.1145/1376616.1376631 – ident: ref25 doi: 10.1007/978-3-319-12229-8 – ident: ref22 doi: 10.1007/978-0-387-88735-7_10 – ident: ref1 doi: 10.1145/1721654.1721672 – ident: ref9 – ident: ref15 doi: 10.1016/B978-012088469-8.50064-4 – ident: ref5 doi: 10.1016/j.jss.2012.12.025 – ident: ref18 doi: 10.1109/ICDE.2011.5767862 – ident: ref2 – ident: ref19 doi: 10.1109/ICDE.2013.6544870 – ident: ref21 doi: 10.1007/3-540-45811-5_37 – ident: ref6 doi: 10.1109/MIC.2012.14 – ident: ref23 – ident: ref17 doi: 10.1007/11805588_7 – ident: ref16 doi: 10.1007/978-3-540-24571-1_10 – ident: ref12 doi: 10.14569/IJACSA.2018.090446 – ident: ref8 |
SSID | ssib044733352 |
Score | 2.1277626 |
Snippet | One
of the most emerging computer technologies of this decade is cloud computing
that allows data owners to outsource their storage and computing requirements.... |
SourceID | crossref |
SourceType | Aggregation Database |
StartPage | 1 |
Title | PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT |
Volume | 61 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLbKuHBBQ4D4MVAOiEvkscZOmh5N67WFNpmypiqnykkcDcHKtDYXDvxz_GM824mXlh4Gl6i17Cj1-_r5Pee9zwi9K7peUIIrgGm_m2PaIwSHsE4BlkUuvVJ0qVbXn0XBOKWflv6y0_ndylqqttlp_vNgXcn_WBXawK6qSvYfLGtvCg3wGewLV7AwXO9l44tksmCDL1hNI08WauPpM444g69zN-KT0fhjnCaulr29iKfmhJ0Zn4_jITS6LHLjdH4JXQZ86PJoMUniyIr7N_IF7QqSjXsulFaHfi1f08JmL7mDrb-JW6FICIJwl3mYEX3CjkaDHaP261taiJb32XQy5FznHsyqK3F9LQo3-Vpur-zWf3w5Y1E8mqamDyDY7j6koySdasRW35uEnnpHQxVRBc3LGU18ENSFOKA1S8sDbTVzGxn3HYQaGu621nPD5fsrBQFiVUqrorrZyFPweUNTVbqryL23Utr8RYic9A1WevjKDH-AHnpKrl_lj_7iDalRhX-iT36yv8Foveo7fGg_QMs3ajk582P0uI5OHGag9gR15PopWv4NM8fCzLEwc3Zg5hiYQaPDIucOZk4LZs9Qes7ngzGuD-TAufK0ceEJH_7TQU4DSctSFHlOMqlqnZUCqJ8FPhV-n0gIAc7CIqC9fgbLAcQESpfQExl5jo7WP9byBXJCxQJnJVVCsZSEvbDMRShlWYKHK4kfvETvm6lY3RjdldXBWX91346v0aM7sJ2go-1tJd-AQ7nN3mqD_QG4tWkn |
link.rule.ids | 315,786,790,27946,27947 |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PRIVACY-PRESERVING+K-NEAREST+NEIGHBOUR+INTERPOLATION+METHOD+IN+AN+OUTSOURCED+ENVIRONMENT&rft.jtitle=Communications+Faculty+of+Sciences+University+of+Ankara+Series+A2-A3+Physical+Sciences+and+Engineering&rft.au=KALIDEEN%2C+Muhammad+Rifthy&rft.au=OSMANOGLU%2C+Murat&rft.au=TUGRUL%2C+Bulent&rft.date=2019-06-30&rft.issn=2618-6462&rft.eissn=2618-6462&rft.volume=61&rft.issue=1&rft.spage=1&rft.epage=11&rft_id=info:doi/10.33769%2Faupse.533815&rft.externalDBID=n%2Fa&rft.externalDocID=10_33769_aupse_533815 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2618-6462&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2618-6462&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2618-6462&client=summon |