Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data

被引:47
|
作者
Liu, Lin [1 ]
Su, Jinshu [1 ]
Liu, Ximeng [2 ,3 ,4 ]
Chen, Rongmao [1 ]
Huang, Kai [1 ]
Deng, Robert H. [2 ]
Wang, Xiaofeng [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, Singapore, Singapore
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350007, Fujian, Peoples R China
[4] Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350007, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data security and privacy; k-nearest neighbor (KNN) classification; privacy-preserving out-sourcing; MULTIPARTY COMPUTATION; PRIVACY; ALGORITHM;
D O I
10.1109/JIOT.2019.2932444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, outsourcing data and machine learning tasks, e.g., k-nearest neighbor (KNN) classification, to clouds has become a scalable and cost-effective way for large scale data storage, management, and processing. However, data security and privacy issue have been a serious concern in outsourcing data to clouds. In this article, we propose a privacy-preserving KNN classification scheme on cloud data in a twin-cloud model based on an additively homomorphic cryptosystem and secret sharing. Compared with existing works, we redesign a set of lightweight building blocks, such as secure square Euclidean distance, secure comparison, secure sorting, secure minimum, and maximum number finding, and secure frequency calculating, which achieve the same security level but with higher efficiency. In our scheme, data owners stay offline, which is different from secure-multiparty computation-based solutions which require data owners' stay online during computation. In addition, query users do not interact with the cloud except sending query data and receiving the query results. Our security analysis shows that the scheme protects outsourced data security and query privacy, and hides access patterns. The experiments on real-world dataset indicate that our scheme is significantly more efficient than existing schemes.
引用
收藏
页码:9841 / 9852
页数:12
相关论文
共 50 条
  • [1] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Qingqing GAN
    Xiaoming WANG
    Xuefeng FANG
    ScienceChina(InformationSciences), 2018, 61 (12) : 97 - 111
  • [2] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Gan, Qingqing
    Wang, Xiaoming
    Fang, Xuefeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (12)
  • [3] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Qingqing Gan
    Xiaoming Wang
    Xuefeng Fang
    Science China Information Sciences, 2018, 61
  • [4] Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Wu, Wei
    Xian, Ming
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 236 - 243
  • [5] A Secure and Efficient Data Sharing Scheme with Outsourced Signcryption and Decryption in Mobile Cloud Computing
    Fugkeaw, Somchart
    2021 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING (JCC 2021) / 2021 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2021), 2021, : 72 - 79
  • [6] Secure kNN query of outsourced spatial data using two-cloud architecture
    Tasneem Ghunaim
    Ibrahim Kamel
    Zaher Al Aghbari
    The Journal of Supercomputing, 2023, 79 : 21310 - 21345
  • [7] Secure kNN query of outsourced spatial data using two-cloud architecture
    Ghunaim, Tasneem
    Kamel, Ibrahim
    Al Aghbari, Zaher
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (18): : 21310 - 21345
  • [8] Secure KNN Set Similarity Search in Outsourced Cloud Environments
    Li, Lu
    Jiang, Xufeng
    Gao, Ge
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 474 - 479
  • [9] Enabling Secure Outsourced Cloud Data
    Sankareeswari, G.
    Selvi, S.
    Vidhyalakshmi, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [10] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176