PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT

One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud prom...

Full description

Saved in:
Bibliographic Details
Published inCommunications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering Vol. 61; no. 1; pp. 1 - 11
Main Authors KALIDEEN, Muhammad Rifthy, OSMANOGLU, Murat, TUGRUL, Bulent
Format Journal Article
LanguageEnglish
Published 30.06.2019
Online AccessGet full text

Cover

Loading…
Abstract One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.
AbstractList One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.
Author KALIDEEN, Muhammad Rifthy
TUGRUL, Bulent
OSMANOGLU, Murat
Author_xml – sequence: 1
  givenname: Muhammad Rifthy
  orcidid: 0000-0001-5790-1166
  surname: KALIDEEN
  fullname: KALIDEEN, Muhammad Rifthy
– sequence: 2
  givenname: Murat
  orcidid: 0000-0001-8693-141X
  surname: OSMANOGLU
  fullname: OSMANOGLU, Murat
– sequence: 3
  givenname: Bulent
  orcidid: 0000-0003-4719-4298
  surname: TUGRUL
  fullname: TUGRUL, Bulent
BookMark eNpNkE1PwjAcxhuDiYgcvfcLFNv92247zlGhEdpldERPSze6hESBbPHAt5eAB0_PS548h98jGh2Oh4DQM6MzgFimL_7nNISZAEiYuEPjSLKESC6j0T__gKbDsG8o5zEAiGiMPopSb7P8kxSl2qhyq80CvxOjskt02Ci9WL7aqsTaOFUWdpU5bQ1eK7e080uJM4Nt5TaXSa7mWJmtLq1ZK-Oe0H3nv4Yw_dMJqt6Uy5dkZRc6z1akZYILsou84CmTLZeBd53ftS00gYskocBANFJwL1IIIhY02Ukep00SU8EpY5RGvoEJIrfftj8OQx-6-tTvv31_rhmtr2TqK5n6RgZ-Ae_9UQE
CitedBy_id crossref_primary_10_7717_peerj_cs_965
Cites_doi 10.2196/jmir.2494
10.1145/2484402.2484415
10.1145/2820783.2820880
10.1007/s00778-011-0245-7
10.1145/1559845.1559862
10.1016/j.jnca.2016.04.001
10.1109/ICDE.2014.6816690
10.1109/ICDCS.2008.79
10.1186/1869-0238-4-5
10.1145/1376616.1376631
10.1007/978-3-319-12229-8
10.1007/978-0-387-88735-7_10
10.1145/1721654.1721672
10.1016/B978-012088469-8.50064-4
10.1016/j.jss.2012.12.025
10.1109/ICDE.2011.5767862
10.1109/ICDE.2013.6544870
10.1007/3-540-45811-5_37
10.1109/MIC.2012.14
10.1007/11805588_7
10.1007/978-3-540-24571-1_10
10.14569/IJACSA.2018.090446
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.33769/aupse.533815
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2618-6462
EndPage 11
ExternalDocumentID 10_33769_aupse_533815
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
M~E
ID FETCH-LOGICAL-c1545-d2a54916c46e4ffadcc3be458803135b654a593e57508d6479b87054011002ab3
ISSN 2618-6462
IngestDate Fri Aug 23 02:35:33 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1545-d2a54916c46e4ffadcc3be458803135b654a593e57508d6479b87054011002ab3
ORCID 0000-0001-5790-1166
0000-0001-8693-141X
0000-0003-4719-4298
OpenAccessLink https://dergipark.org.tr/en/download/article-file/660330
PageCount 11
ParticipantIDs crossref_primary_10_33769_aupse_533815
PublicationCentury 2000
PublicationDate 2019-06-30
PublicationDateYYYYMMDD 2019-06-30
PublicationDate_xml – month: 06
  year: 2019
  text: 2019-06-30
  day: 30
PublicationDecade 2010
PublicationTitle Communications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineering
PublicationYear 2019
References ref13
ref12
ref15
ref14
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref4
  doi: 10.2196/jmir.2494
– ident: ref20
  doi: 10.1145/2484402.2484415
– ident: ref7
  doi: 10.1145/2820783.2820880
– ident: ref14
  doi: 10.1007/s00778-011-0245-7
– ident: ref10
  doi: 10.1145/1559845.1559862
– ident: ref13
  doi: 10.1016/j.jnca.2016.04.001
– ident: ref26
  doi: 10.1109/ICDE.2014.6816690
– ident: ref11
  doi: 10.1109/ICDCS.2008.79
– ident: ref3
  doi: 10.1186/1869-0238-4-5
– ident: ref24
  doi: 10.1145/1376616.1376631
– ident: ref25
  doi: 10.1007/978-3-319-12229-8
– ident: ref22
  doi: 10.1007/978-0-387-88735-7_10
– ident: ref1
  doi: 10.1145/1721654.1721672
– ident: ref9
– ident: ref15
  doi: 10.1016/B978-012088469-8.50064-4
– ident: ref5
  doi: 10.1016/j.jss.2012.12.025
– ident: ref18
  doi: 10.1109/ICDE.2011.5767862
– ident: ref2
– ident: ref19
  doi: 10.1109/ICDE.2013.6544870
– ident: ref21
  doi: 10.1007/3-540-45811-5_37
– ident: ref6
  doi: 10.1109/MIC.2012.14
– ident: ref23
– ident: ref17
  doi: 10.1007/11805588_7
– ident: ref16
  doi: 10.1007/978-3-540-24571-1_10
– ident: ref12
  doi: 10.14569/IJACSA.2018.090446
– ident: ref8
SSID ssib044733352
Score 2.1277626
Snippet One of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements....
SourceID crossref
SourceType Aggregation Database
StartPage 1
Title PRIVACY-PRESERVING K-NEAREST NEIGHBOUR INTERPOLATION METHOD IN AN OUTSOURCED ENVIRONMENT
Volume 61
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLbKuHBBQ4D4MVAOiEvkscZOmh5N67WFNpmypiqnykkcDcHKtDYXDvxz_GM824mXlh4Gl6i17Cj1-_r5Pee9zwi9K7peUIIrgGm_m2PaIwSHsE4BlkUuvVJ0qVbXn0XBOKWflv6y0_ndylqqttlp_vNgXcn_WBXawK6qSvYfLGtvCg3wGewLV7AwXO9l44tksmCDL1hNI08WauPpM444g69zN-KT0fhjnCaulr29iKfmhJ0Zn4_jITS6LHLjdH4JXQZ86PJoMUniyIr7N_IF7QqSjXsulFaHfi1f08JmL7mDrb-JW6FICIJwl3mYEX3CjkaDHaP261taiJb32XQy5FznHsyqK3F9LQo3-Vpur-zWf3w5Y1E8mqamDyDY7j6koySdasRW35uEnnpHQxVRBc3LGU18ENSFOKA1S8sDbTVzGxn3HYQaGu621nPD5fsrBQFiVUqrorrZyFPweUNTVbqryL23Utr8RYic9A1WevjKDH-AHnpKrl_lj_7iDalRhX-iT36yv8Foveo7fGg_QMs3ajk582P0uI5OHGag9gR15PopWv4NM8fCzLEwc3Zg5hiYQaPDIucOZk4LZs9Qes7ngzGuD-TAufK0ceEJH_7TQU4DSctSFHlOMqlqnZUCqJ8FPhV-n0gIAc7CIqC9fgbLAcQESpfQExl5jo7WP9byBXJCxQJnJVVCsZSEvbDMRShlWYKHK4kfvETvm6lY3RjdldXBWX91346v0aM7sJ2go-1tJd-AQ7nN3mqD_QG4tWkn
link.rule.ids 315,786,790,27946,27947
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PRIVACY-PRESERVING+K-NEAREST+NEIGHBOUR+INTERPOLATION+METHOD+IN+AN+OUTSOURCED+ENVIRONMENT&rft.jtitle=Communications+Faculty+of+Sciences+University+of+Ankara+Series+A2-A3+Physical+Sciences+and+Engineering&rft.au=KALIDEEN%2C+Muhammad+Rifthy&rft.au=OSMANOGLU%2C+Murat&rft.au=TUGRUL%2C+Bulent&rft.date=2019-06-30&rft.issn=2618-6462&rft.eissn=2618-6462&rft.volume=61&rft.issue=1&rft.spage=1&rft.epage=11&rft_id=info:doi/10.33769%2Faupse.533815&rft.externalDBID=n%2Fa&rft.externalDocID=10_33769_aupse_533815
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2618-6462&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2618-6462&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2618-6462&client=summon