Abstract
The paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification and querying is entirely delegated to a third party data miner without sharing either the original dataset or individual queries. Privacy is maintained using two property preserving encryption schemes, a homomorphic encryption scheme and bespoke order preserving encryption scheme. The proposed solution provides advantages of: (i) preserving the data privacy of the parties involved, (ii) preserving the confidentiality of the data owner encryption key, (iii) hiding the query resolution process and (iv) providing for scalability with respect to alternative data mining algorithms and alternative collaborative data mining scenarios. The results indicate that the proposed solution is both efficient and effective whilst at the same time being secure against potential attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 SIGMOD International Conference on Management of Data, pp. 439–450. ACM (2000)
Almutairi, N., Coenen, F., Dures, K.: K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction. In: Bellatreche, L., Chakravarthy, S. (eds.) DaWaK 2017. LNCS, vol. 10440, pp. 274–285. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64283-3_20
Almutairi, N., Coenen, F., Dures, K.: Data clustering using homomorphic encryption and secure chain distance matrices. SciTePress (2018). https://liverpool.idm.oclc.org/login?url=search.ebscohost.com/login.aspx?direct=true&db=ir00019a&AN=uol.3023624&site=eds-live&scope=site
Almutairi, N., Coenen, F., Dures, K.: Secure third party data clustering using \({\varPhi }\) data: multi-user order preserving encryption and super secure chain distance matrices (best technical paper). In: Bramer, M., Petridis, M. (eds.) SGAI 2018. LNCS (LNAI), vol. 11311, pp. 3–17. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04191-5_1
Chen, T., Chen, J., Zhou, B.: A system for parallel data mining service on cloud. In: Second International Conference on Cloud and Green Computing, pp. 329–330 (2012)
Das, A.K.: European Union’s general data protection regulation, 2018: a brief overview. Ann. Libr. Inf. Stud. (ALIS) 65(2), 139–140 (2018)
Dasarathy, B.V.: Nearest neighbor (NN) norms: NN pattern classification techniques. IEEE Computer Society Press (1991)
Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism*. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45811-5_37
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: 2014 IEEE 30th International Conference on Data Engineering, pp. 664–675, March 2014
Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary Version 78 (1998)
Gostin, L.O.: National health information privacy: regulations under the Health Insurance Portability and Accountability Act. J. Am. Med. Assoc. (JAMA) 285(23), 3015–3021 (2001)
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 27th International Conference on Data Engineering (ICDE), pp. 601–612 (2011). https://liverpool.idm.oclc.org/login?url=search.ebscohost.com/login.aspx?direct=true&db=edseee&AN=edseee.5767862&site=eds-live&scope=site
Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 SIGMOD International Conference on Management of Data, pp. 37–48. ACM (2005)
Lichman, M.: UCI machine learning repository (2013). http://archive.ics.uci.edu/ml
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)
Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput. Pract. Exp. 25(13), 1967–1984 (2013)
Liu, D.: Homomorphic encryption for database querying. Patent 27(PCT/AU2013/000674), December 2013. iPC\(\_\)class = H04L 9/00 (2006.01), H04L 9/28 (2006.01), H04L 9/30 (2006.01)
Liu, J., Xiong, L., Luo, J., Huang, J.Z.: Privacy preserving distributed DBSCAN clustering. Trans. Data Priv. 6(1), 69–85 (2013)
Liu, L., Kantarcioglu, M., Thuraisingham, B.: The applicability of the perturbation based privacy preserving data mining for real-world data. Data Knowl. Eng. 65(1), 5–21 (2008)
Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198–207 (2016)
Makhoul, J., Kubala, F., Schwartz, R., Weischedel, R.: Performance measures for information extraction. In: Proceedings of DARPA Broadcast News Workshop, Herndon, VA, Morgan Kaufmann, pp. 249–252 (1999)
Narayanan, A., Shmatikov, V.: Robust De-anonymization of large sparse datasets. In: Proceedings of the 2008 Symposium on Security and Privacy, pp. 111–125. IEEE (2008)
Rahman, M.S., Basu, A., Kiyomoto, S.: Towards outsourced privacy-preserving multiparty DBSCAN. In: 22nd Pacific Rim International Symposium on Dependable Computing, pp. 225–226. IEEE (2017)
Robling Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)
Samanthula, B.K., Elmehdwi, Y., Jiang, W.: k-Nearest Neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261–1273 (2015)
Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Sun, X., Wang, H., Li, J., Pei, J.: Publishing anonymous survey rating data. Data Min. Knowl. Discov. 23(3), 379–406 (2011)
Sweeney, L.: Matching known patients to health records in Washington state data. 01 June 2013. http://thedatamap.org/risks.html, http://thedatamap.org/risks.html. Accessed 3 May 2019
Sweeney, L., Abu, A., Winn, J.: Identifying participants in the personal genome project by name, 24 April 2013. http://dataprivacylab.org/projects/pgp/. Accessed 3 May 2019
Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Wong, W.K., Cheung, D.W.l., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, SIGMOD 2009, pp. 139–152. ACM, New York (2009)
Xu, H., Guo, S., Chen, K.: Building confidential and efficient query services in the cloud with RASP data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322–335 (2014). https://doi.org/10.1109/TKDE.2012.251
Xu, S., Cheng, X., Su, S., Xiao, K., Xiong, L.: Differentially private frequent sequence mining. IEEE Trans. Knowl. Data Eng. 28(11), 2910–2926 (2016)
Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 733–744, April 2013. https://doi.org/10.1109/ICDE.2013.6544870
Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. Knowl. Data Eng. 24(2), 338–352 (2012)
Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: 2013 Proceedings IEEE INFOCOM, pp. 2652–2660. IEEE (2013)
Zhu, Y., Takagi, T., Hu, R.: Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE Trans. Inf. Syst. 97(2), 326–330 (2014)
Zhu, Y., Wang, Z., Zhang, Y.: Secure k-NN query on encrypted cloud data with limited key-disclosure and offline data owner. In: Bailey, J., Khan, L., Washio, T., Dobbie, G., Huang, J.Z., Wang, R. (eds.) PAKDD 2016. LNCS (LNAI), vol. 9652, pp. 401–414. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31750-2_32
Zhu, Y., Xu, R., Takagi, T.: Secure k-NN query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3–4), 201–217 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Almutairi, N., Coenen, F., Dures, K. (2020). Secure Outsourced kNN Data Classification over Encrypted Data Using Secure Chain Distance Matrices. In: Fred, A., Salgado, A., Aveiro, D., Dietz, J., Bernardino, J., Filipe, J. (eds) Knowledge Discovery, Knowledge Engineering and Knowledge Management. IC3K 2018. Communications in Computer and Information Science, vol 1222. Springer, Cham. https://doi.org/10.1007/978-3-030-49559-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-49559-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49558-9
Online ISBN: 978-3-030-49559-6
eBook Packages: Computer ScienceComputer Science (R0)