Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments

Classification is used in various areas where <i>k</i>-nearest neighbor classification is the most popular as it produces efficient results. Cloud computing with powerful resources is one reliable option for handling large-scale data efficiently, but many companies are reluctant to outso...

Full description

Bibliographic Details
Main Authors: Jeongsu Park, Dong Hoon Lee
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/24/4132
_version_ 1797460065903443968
author Jeongsu Park
Dong Hoon Lee
author_facet Jeongsu Park
Dong Hoon Lee
author_sort Jeongsu Park
collection DOAJ
description Classification is used in various areas where <i>k</i>-nearest neighbor classification is the most popular as it produces efficient results. Cloud computing with powerful resources is one reliable option for handling large-scale data efficiently, but many companies are reluctant to outsource data due to privacy concerns. This paper aims to implement a privacy-preserving <i>k</i>-nearest neighbor classification (P<i>k</i>NC) in an outsourced environment. Existing work proposed a secure protocol (S<i>k</i>LE/S<i>k</i>SE) to compute <i>k</i> data with the largest/smallest value privately, but this work discloses information. Moreover, S<i>k</i>LE/S<i>k</i>SE requires a secure comparison protocol, and the existing protocols also contain information disclosure problems. In this paper, we propose a new secure comparison and S<i>k</i>LE/S<i>k</i>SE protocols to solve the abovementioned information disclosure problems and implement P<i>k</i>NC with these novel protocols. Our proposed protocols disclose no information and we prove the security formally. Then, through extensive experiments, we demonstrate that the P<i>k</i>NC applying the proposed protocols is also efficient. Especially, the P<i>k</i>NC is suitable for big data analysis to handle large amounts of data, since our S<i>k</i>LE/S<i>k</i>SE is executed for each dataset in parallel. Although the proposed protocols do require efficiency sacrifices to improve security, the running time of our P<i>k</i>NC is still significantly more efficient compared with previously proposed P<i>k</i>NCs.
first_indexed 2024-03-09T17:00:51Z
format Article
id doaj.art-ae58b48c17b040f3a87584bd3efd79a2
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T17:00:51Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-ae58b48c17b040f3a87584bd3efd79a22023-11-24T14:30:51ZengMDPI AGElectronics2079-92922022-12-011124413210.3390/electronics11244132Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing EnvironmentsJeongsu Park0Dong Hoon Lee1Graduate School of Information Security, Korea University, Seoul 02841, Republic of KoreaGraduate School of Information Security, Korea University, Seoul 02841, Republic of KoreaClassification is used in various areas where <i>k</i>-nearest neighbor classification is the most popular as it produces efficient results. Cloud computing with powerful resources is one reliable option for handling large-scale data efficiently, but many companies are reluctant to outsource data due to privacy concerns. This paper aims to implement a privacy-preserving <i>k</i>-nearest neighbor classification (P<i>k</i>NC) in an outsourced environment. Existing work proposed a secure protocol (S<i>k</i>LE/S<i>k</i>SE) to compute <i>k</i> data with the largest/smallest value privately, but this work discloses information. Moreover, S<i>k</i>LE/S<i>k</i>SE requires a secure comparison protocol, and the existing protocols also contain information disclosure problems. In this paper, we propose a new secure comparison and S<i>k</i>LE/S<i>k</i>SE protocols to solve the abovementioned information disclosure problems and implement P<i>k</i>NC with these novel protocols. Our proposed protocols disclose no information and we prove the security formally. Then, through extensive experiments, we demonstrate that the P<i>k</i>NC applying the proposed protocols is also efficient. Especially, the P<i>k</i>NC is suitable for big data analysis to handle large amounts of data, since our S<i>k</i>LE/S<i>k</i>SE is executed for each dataset in parallel. Although the proposed protocols do require efficiency sacrifices to improve security, the running time of our P<i>k</i>NC is still significantly more efficient compared with previously proposed P<i>k</i>NCs.https://www.mdpi.com/2079-9292/11/24/4132cloud computingbig data analysisk-nearest neighbor classificationprivacy-preserving computation
spellingShingle Jeongsu Park
Dong Hoon Lee
Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Electronics
cloud computing
big data analysis
k-nearest neighbor classification
privacy-preserving computation
title Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
title_full Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
title_fullStr Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
title_full_unstemmed Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
title_short Parallelly Running and Privacy-Preserving <i>k</i>-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
title_sort parallelly running and privacy preserving i k i nearest neighbor classification in outsourced cloud computing environments
topic cloud computing
big data analysis
k-nearest neighbor classification
privacy-preserving computation
url https://www.mdpi.com/2079-9292/11/24/4132
work_keys_str_mv AT jeongsupark parallellyrunningandprivacypreservingikinearestneighborclassificationinoutsourcedcloudcomputingenvironments
AT donghoonlee parallellyrunningandprivacypreservingikinearestneighborclassificationinoutsourcedcloudcomputingenvironments