CFP last date
20 January 2025
Reseach Article

Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

by Swathy J., Surya S.R.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 8
Year of Publication: 2016
Authors: Swathy J., Surya S.R.
10.5120/ijca2016907988

Swathy J., Surya S.R. . Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data. International Journal of Computer Applications. 133, 8 ( January 2016), 1-4. DOI=10.5120/ijca2016907988

@article{ 10.5120/ijca2016907988,
author = { Swathy J., Surya S.R. },
title = { Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 8 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number8/23803-2016907988/ },
doi = { 10.5120/ijca2016907988 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:33.727544+05:30
%A Swathy J.
%A Surya S.R.
%T Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 8
%P 1-4
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data mining has wide variety of real time application in many fields such as financial, telecommunication, biological, and among government agencies. Classification is the one of the main task in data mining. For the past few years, due to the increment in various privacy problem, many conceptual and feasible solution to the classification problem have been proposed under different certainty prototype. With the increment of cloud computing users have an opportunity to offload the data and processing to the cloud, in an encrypted form. The data in the cloud are in encrypted form, existing privacy preserving classification systems are not relevant. This paper reviews how to perform privacy preserving k-NN classification over encrypted data in the cloud. The recommended protocol preserves privacy of data, protect the user query, and hide the access mode.

References
  1. P. Mell and T. Grance, “The nist definition of cloud computing (draft), NIST special publication” vol. 800, p. 145, 2011.
  2. Subodh Gangan , “A Review of Man-in-the-Middle Attacks”.
  3. A. Shamire, “How to share a secret” Commun. ACM, vol. 22, pp. 612-613, Nov. 1979.
  4. IBM Thomas J, “How to share secret with cheaters” Journal of Cryptology, I:133-138, 1988.
  5. Martenvan Dijk and Ari Juels , “On the Impossibility of Cryptography alone for Privacy-Preserving Cloud computing”.
  6. C. Gentry, “Fully homomorphic encryption using ideal lattices” in ACM STOC, pp. 169-178, 2009.
  7. R.Natarajan1, Dr.R.Sugumar, M.Mahendran and K.Anbazhagan, “ A survey on Privacy Preserving Data Mining ” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 1, March 2012.
  8. Y. Lindell and B. Pinkas, “Privacy preserving data mining” in Advances in Cryptology (CRYPTO), pp. 3654, Springer, 2000.
  9. Thair Nu Phyu, “Survey of Classification Techniques in Data Mining ” Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol IIMECS 2009, March 18 - 20, 2009, Hong Kong.
  10. M. Kantarcioglu and C. Clifton, “Privately computing a distributed k-nn classifier” in PKDD, pp. 279290, 2004.
  11. Justin Zhan,LiWu Chang and Stan Matwin, “Privacy Perserbing K-nearest Neighbor Classification” International Journal of Network Security ,Vol.1 No,1,PP.46-51,July 2005.
  12. M. Bohanec and B. Zupan, “The UCI KDD Archive” http: //archive.ics.uci.edu/ml/datasets/Car+Evaluation, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Security k-NN classifier outsourced databases encryption