Skip to main content
Log in

Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

To utilize the cost-saving advantages of the cloud computing paradigm, individuals and enterprises increasingly resort to outsource their databases and data operations to cloud servers. However such solutions come with the risk of violating the privacy of users. To protect privacy, the outsourced databases are usually encrypted, making it difficult to run queries and other data mining tasks without decrypting the data first. Conventional encryption methods are either incapable of supporting such operations or computationally expensive to do so. In this paper, we aim to efficiently support computations over encrypted cloud databases, particularly focusing on privacy preserving k-nearest neighbor classification. The proposed scheme efficiently protects database security, key confidentiality of the data owner, query privacy and data access patterns. We analyze the cost of our proposed scheme and evaluate the performance through extensive experiments using both synthetic and real databases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8

Similar content being viewed by others

References

  1. Aggarwal, C.C., Philip. S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining, pp. 11–52. Springer, Berlin (2008)

  2. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD international conference on management of data, p 2004. ACM, New York (2004)

  3. Bugiel, S., Nurnberger, S., Sadeghi, A., Schneider, T.: Twin clouds: an architecture for secure cloud computing. In: Workshop on cryptography and security in clouds (WCSC 2011) (2011)

  4. Cao, N., Wang, C., Li, Ming, Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: INFOCOM, 2011 Proceedings IEEE, pp. 829–837. IEEE, Piscataway (2011)

  5. Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st international conference on distributed computing systems (ICDCS), pp. 393–402. IEEE, Piscataway (2011)

  6. Choi, S., Ghinita, G., Lim, H.-S., Bertino, E.: Secure knn query processing in untrusted cloud environments. IEEE Trans. Knowl. Data Eng. 26(11), 2818–2831 (2014)

    Article  Google Scholar 

  7. Delfs, H., Knebl, H., Knebl, H.: Introduction to cryptography, vol. 2. Springer, Berlin (2002)

    Book  MATH  Google Scholar 

  8. Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: 2014 IEEE 30th international conference on data engineering (ICDE) , pp. 664–675. IEEE, Piscataway (2014)

  9. Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. Inf. Syst. 29(4), 343–364 (2004)

    Article  Google Scholar 

  10. Huang, J., Peng, M., Wang, H., Cao, J., Gao, W., Zhang, X.: A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20(2), 325–350 (2017)

    Article  Google Scholar 

  11. Ji, Z., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web 17(4), 539–568 (2014)

    Article  Google Scholar 

  12. Kabir, Md.E., Wang, H., Bertino, E.: Efficient systematic clustering method for k-anonymization. Acta Informatica 48(1), 51–66 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  13. Kabir, Md.E., Wang, H., Bertino, E.: A role-involved purpose-based access control model. Inf. Syst. Front. 14(3), 809–822 (2012)

    Article  Google Scholar 

  14. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the ACM conference on computer and communications security, p 2012. ACM, New York (2012)

  15. LeCun, Y., Cortes, C., Burges, C.J.C.: Mnist handwritten digit database. AT&T Labs [Online]. Available: http://yann.lecun.com/exdb/mnist, 2 (2010)

  16. Li, M., Sun, X., Wang, H., Zhang, Y., Ji, Z.: Privacy-aware access control with trust management in Web service. World Wide Web 14(4), 407–430 (2011)

    Article  Google Scholar 

  17. Li, H., Ye, W., Wang, H., Zhou, B.: Multi-window based ensemble learning for classification of imbalanced streaming data. World Wide Web, 1–19 (2017)

  18. Li, X., Zhu, Y., Wang, J., Liu, Z., Liu, Y., Zhang, M.: On the soundness and security of privacy-preserving svm for outsourcing data classification. IEEE Trans. Dependable Secure Comput. PP(99), 1–1 (2017)

    Google Scholar 

  19. Liu, K., Giannella, C., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. Knowl. Discov. Data: PKDD 2006, 297–308 (2006)

    Google Scholar 

  20. Mell, P., Grance, T., et al.: The nist definition of cloud computing (2011)

  21. Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian symposium on databases, Citeseer, pp. 304–318 (2003)

  22. Peng, M., Zeng, G., Sun, Z., Huang, J., Wang, H., Tian, G.: Personalized app. recommendation based on app. permissions. World Wide Web, 1–16 (2017)

  23. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE symposium on security and privacy (SP), pp. 463–477. IEEE, Piscataway (2013)

  24. Rahulamathavan, Y., Phan, R.C.-W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467–479 (2014)

    Article  Google Scholar 

  25. Rong, H., Wang, H.-M., Liu, J., Xian, M.: Privacy-preserving k-nearest neighbor computation in multiple cloud environments. IEEE Access 4, 9589–9603 (2016)

    Article  Google Scholar 

  26. Samanthula, B.K., Elmehdwi, Y., Jiang, W.: K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261–1273 (2015)

    Article  Google Scholar 

  27. Su, M.-Y., Chang, K.-C., Wei, H.-F., Lin, C.-Y.: Feature weighting and selection for a real-time network intrusion detection system based on ga with knn. In: International Conference on Intelligence and Security Informatics, pp. 195–204. Springer, Berlin (2008)

  28. Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, T.Y., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp. 71–82. ACM, New York (2013)

  29. Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)

    Article  Google Scholar 

  30. Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21(6), 840–853 (2009)

    Article  Google Scholar 

  31. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)

    Article  Google Scholar 

  32. Wang, B., Liao, Q., Zhang, C.: Weight based knn recommender system. In: 2013 5th international conference on intelligent human-machine systems and cybernetics (IHMSC), vol. 2, pp. 449–452. IEEE, Piscataway (2013)

  33. Wang, H., Zhang, Z., Taleb, T.: Editorial: special issue on security and privacy of IoT. World Wide Web-internet & Web Information Systems (2), 1–6 (2017)

  34. Wong, W.K., Cheung, D.W.-l., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139–152. ACM, New York (2009)

  35. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27 (2), 340–352 (2016)

    Article  Google Scholar 

  36. Xu, H., Guo, S., Chen, K.: Building confidential and efficient query services in the cloud with rasp data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322–335 (2014)

    Article  Google Scholar 

  37. Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 2013 IEEE 29th international conference on data engineering (ICDE), pp. 733–744. IEEE, Piscataway (2013)

  38. Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. Knowl. Data Eng. 24(2), 338–352 (2012)

    Article  Google Scholar 

  39. Youwen, Z.H.U., Takagi, T., Rong, H.U.: Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE TRANSACTIONS on Information and Systems 97(2), 326–330 (2014)

    Google Scholar 

  40. Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: INFOCOM, 2013 Proceedings IEEE, pp. 2652–2660. IEEE, Piscataway (2013)

  41. Zhou, L., Zhu, Y., Castiglione, A.: Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. Comput. Secur. 69, 84–96 (2017)

    Article  Google Scholar 

  42. Zhu, Y., Xu, R., Takagi, T.: Secure k-nn computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 international workshop on security in cloud computing, pp. 55–60. ACM, New York (2013)

  43. Zhu, Y., Rui, X., Takagi, T.: Secure k-nn query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3-4), 201–217 (2013)

    Article  Google Scholar 

  44. Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-nn query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, W., Parampalli, U., Liu, J. et al. Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments. World Wide Web 22, 101–123 (2019). https://doi.org/10.1007/s11280-018-0539-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-018-0539-4

Keywords

Navigation