Advertisement

Privacy-Protected KNN Classification Algorithm Based on Negative Database

  • Hucheng LiaoEmail author
  • Yu Chen
  • Shihu Bu
  • Mingkun Zhang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1075)

Abstract

Negative database (NDB) is a new type of information representation method that protects private data by storing data in the raw data complement set. The KNN classification algorithm is a classic classification algorithm, and the Euclidean distance formula is one of the most commonly used distance calculation formulas in classification algorithms. However, the distance calculation method for the existing KNN classification algorithm based on negative database is the one-hot coded Hamming distance formula. For this encoding method, when data set have many attributes, the length of the binary string becomes extremely long after encoding, thereby it increases the computational cost and complexity of the classification algorithm. In this paper, we proposed a KNN classification algorithm based on the Euclidean distance formula on the negative database, which is used to complete the classification research under the premise of protecting data security. The experimental results show that the algorithm in this paper achieves high classification accuracy.

Keywords

Negative database KNN classification Euclidean distance 

References

  1. 1.
    Zhan, J.Z., Chang, L., Matwin, S.: Privacy preserving k-nearest neighbor classification. IJ Netw. Secur. 1(1), 46–51 (2005)Google Scholar
  2. 2.
    Liu, R., Luo, W., Yue, L.: Classifying and clustering in negative databases. Front. Comput. Sci. 7(6), 864–874 (2013)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Wu, W., Liu, J., Rong, H., Wang, H., Xian, M.: Efficient k-nearest neighbor classification over semantically secure hybrid encrypted cloud database. IEEE Access 6, 41771–41784 (2018)CrossRefGoogle Scholar
  4. 4.
    Esponda, F.: Everything that is not important: negative databases [research frontier]. IEEE Comput. Intell. Mag. 3(2), 60–63 (2008)CrossRefGoogle Scholar
  5. 5.
    Esponda, F., Trias, E.D., Ackley, E.S., Forrest, S.: A relational algebra for negative databases. University of New Mexico, Technical Report (2007)Google Scholar
  6. 6.
    Esponda, F., Forrest, S., Helman, P.: Enhancing privacy through negative representations of data. NEW MEXICO UNIV ALBUQUERQUE DEPT OF COMPUTER SCIENCE (2004)Google Scholar
  7. 7.
    Zhao, D., Luo, W., Liu, R., Yue, L.: A fine-grained algorithm for generating hard-toreverse negative databases. In: 2015 International Workshop on Artificial Immune Systems (AIS), pp. 1–8. IEEE (2015)Google Scholar
  8. 8.
    Hu, X., Lu, L., Zhao, D., Xiang, J., Liu, X., Zhou, H., Tian, J.: Privacy-preserving K-means clustering upon negative databases. In: International Conference on Neural Information Processing, pp. 191–204. Springer, Cham (2018)CrossRefGoogle Scholar
  9. 9.
    Zhao, D., Luo, W., Liu, R., Yue, L.: Negative iris recognition. IEEE Trans. Dependable Secure Comput. 15(1), 112–125 (2015)CrossRefGoogle Scholar
  10. 10.
    Esponda, F.: Hiding a needle in a haystack using negative databases. In: International Workshop on Information Hiding, pp. 15–29. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    Dheeru, D., Karra Taniskidou, E.: UCI machine learning repository (2017). http://archive.ics.uci.edu/ml. Accessed 10 June 2018
  12. 12.
    Zhao, D., Luo, W.: One-time password authentication scheme based on the negative database. Eng. Appl. Artif. Intell. 62, 396–404 (2017)CrossRefGoogle Scholar
  13. 13.
    Zhao, D., Luo, W., Liu, R., Yue, L.: Experimental analyses of the K-hidden algorithm. Eng. Appl. Artif. Intell. 62, 331–340 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hucheng Liao
    • 1
    Email author
  • Yu Chen
    • 1
  • Shihu Bu
    • 1
  • Mingkun Zhang
    • 1
  1. 1.Wuhan University of TechnologyWuhanChina

Personalised recommendations