Back to Search Start Over

Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments.

Authors :
Guo, Xian
Li, Ye
Jiang, Yongbo
Wang, Jing
Fang, Junli
Source :
Cryptography (2410-387X). Dec2023, Vol. 7 Issue 4, p59. 19p.
Publication Year :
2023

Abstract

In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to a cloud environment. Many researchers have proposed schemes based on cryptographic primitives to address these risks under the assumption that the cloud is a semi-honest participant and query users are honest participants. However, in a real-world environment, users' data privacy and security may be threatened by the presence of malicious participants. Therefore, a novel scheme based on secure multi-party computation is proposed when attackers gain control over both the cloud and a query user in the paper. We prove that our solution can satisfy our goals of security and privacy protection. In addition, our experimental results based on simulated data show feasibility and reliability. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
2410387X
Volume :
7
Issue :
4
Database :
Academic Search Index
Journal :
Cryptography (2410-387X)
Publication Type :
Academic Journal
Accession number :
174414277
Full Text :
https://doi.org/10.3390/cryptography7040059