SlideShare a Scribd company logo
k-Nearest Neighbor Classification over Semantically Secure Encrypted
Relational Data
Abstract:
Data Mining has wide applications in many areas such as banking,
medicine, scientific research and among government agencies.
Classification is one of the commonly used tasks in data mining
applications. For the past decade, due to the rise of various privacy issues,
many theoretical and practical solutions to the classification problem have
been proposed under different security models. However, with the recent
popularity of cloud computing, users now have the opportunity to
outsource their data, in encrypted form, as well as the data mining tasks to
the cloud. Since the data on the cloud is in encrypted form, existing
privacy-preserving classification techniques are not applicable. In this
paper, we focus on solving the classification problem over encrypted data.
In particular, we propose a secure k-NN classifier over encrypted data in
the cloud. The proposed protocol protects the confidentiality of data,
privacy of user’s input query, and hides the data access patterns. To the
best of our knowledge, our work is the first to develop a secure k-NN
classifier over encrypted data under the semi-honest model. Also, we
empirically analyze the efficiency of our proposed protocol using a real-
world dataset under different parameter settings.
Existing System:
Existing work on Privacy-Preserving Data Mining (either perturbation or
secure multi-party computation based approach) cannot solve the DMED
problem. Perturbed data do not possess semantic security, so data
perturbation techniques cannot be used to encrypt highly sensitive data.
Also the perturbed data do not produce very accurate data mining results.
Secure multi-party computation (SMC) based approach assumes data are
distributed and not encrypted at each participating party.
As an emerging computing paradigm, cloud computing attracts many
organizations to consider seriously regarding cloud potential in terms of its
cost-efficiency, flexibility, and offload of administrative overhead. Most
often, organizations delegate their computational operations in addition to
their data to the cloud.
Despite tremendous advantages that the cloud offers, privacy and security
issues in the cloud are preventing companies to utilize those advantages.
When data are highly sensitive, the data need to be encrypted before
outsourcing to the cloud. However, when data are encrypted, irrespective
of the underlying encryption scheme, performing any data mining tasks
becomes very challenging without ever decrypting the data.
Proposed System:
We propose a novel PPkNN protocol, a secure k-NN classifier over
semantically secure encrypted data. In our protocol, once the encrypted
data are outsourced to the cloud, Alice does not participate in any
computations. Therefore, no information is revealed to Alice.
We emphasize that the intermediate results seen by the cloud in our
protocol are either newly generated randomized encryptions or random
numbers. Thus, which data records correspond to the k-nearest neighbors
and the output class label are not known to the cloud.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

PDF
K nearest neighbor classification over semantically secure encrypted relation...
DOCX
K nearest neighbor classification over semantically secure encrypted
DOCX
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
PDF
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...

What's hot (20)

PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Dynamic and public auditing with fair arbitration for cloud data
PPTX
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PPTX
How Blockchain Can Be Used In Big Data Analytics
PDF
Decentralised AI through Distributed Ledger Technologies
PPTX
Mining heterogeneous information networks
PDF
Data Partitioning In Cloud Storage Using DESD Crypto Technique
DOCX
A hybrid cloud approach for secure authorized deduplication
PPTX
1 croreprojects dotnet ppt
PDF
Applying Blockchain Technology for Digital Transformation
DOCX
Achieving effective cloud search services multi keyword ranked search over en...
PDF
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
PDF
The Linked Data Advantage
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Dynamic and public auditing with fair arbitration for cloud data
DN18 | Ocean Protocol – Empowering a Decentralized Marketplace for The New AI...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
How Blockchain Can Be Used In Big Data Analytics
Decentralised AI through Distributed Ledger Technologies
Mining heterogeneous information networks
Data Partitioning In Cloud Storage Using DESD Crypto Technique
A hybrid cloud approach for secure authorized deduplication
1 croreprojects dotnet ppt
Applying Blockchain Technology for Digital Transformation
Achieving effective cloud search services multi keyword ranked search over en...
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
The Linked Data Advantage
Ad

Viewers also liked (7)

PDF
K-Nearest Neighbor
PPTX
K nearest neighbor
PPT
k Nearest Neighbor
PPT
PPT
Data preprocessing
K-Nearest Neighbor
K nearest neighbor
k Nearest Neighbor
Data preprocessing
Ad

Similar to K nearest neighbor classification over semantically secure encrypted relational data (20)

PDF
Secure Encrypted Data in Cloud Based Environment
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
C017421624
PDF
Improving security for data migration in cloud computing using randomized enc...
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PPTX
Cryptography Final Presentation.pptx
PPTX
Encryption Algorithms for Cloud
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
International Journal of Engineering Research and Development
PDF
M.Phil Computer Science Cloud Computing Projects
PDF
M.Phil Computer Science Cloud Computing Projects
PDF
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
PDF
Systemonchip Architectures And Implementations For Privatekey Data Encryption...
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
IRJET- Secure Cloud Storage through Dual Protection
PDF
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
PDF
An interactive Study on secure data sharing in the IOT through Blockchain
Secure Encrypted Data in Cloud Based Environment
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
C017421624
Improving security for data migration in cloud computing using randomized enc...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Cryptography Final Presentation.pptx
Encryption Algorithms for Cloud
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
International Journal of Engineering Research and Development
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Systemonchip Architectures And Implementations For Privatekey Data Encryption...
Cloud Data Security using Elliptic Curve Cryptography
IRJET- Secure Cloud Storage through Dual Protection
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
An interactive Study on secure data sharing in the IOT through Blockchain

More from ieeepondy (20)

PDF
Demand aware network function placement
PDF
Service description in the nfv revolution trends, challenges and a way forward
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Spatial related traffic sign inspection for inventory purposes using mobile l...
PDF
Standards for hybrid clouds
PDF
Rfhoc a random forest approach to auto-tuning hadoop's configuration
PDF
Resource and instance hour minimization for deadline constrained dag applicat...
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PDF
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
PDF
Scalable cloud–sensor architecture for the internet of things
PDF
Scalable algorithms for nearest neighbor joins on big trajectory data
PDF
Robust workload and energy management for sustainable data centers
PDF
Privacy preserving deep computation model on cloud for big data feature learning
PDF
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
PDF
Protection of big data privacy
PDF
Power optimization with bler constraint for wireless fronthauls in c ran
PDF
Performance aware cloud resource allocation via fitness-enabled auction
PDF
Performance limitations of a text search application running in cloud instances
PDF
Performance analysis and optimal cooperative cluster size for randomly distri...
PDF
Predictive control for energy aware consolidation in cloud datacenters
Demand aware network function placement
Service description in the nfv revolution trends, challenges and a way forward
Secure optimization computation outsourcing in cloud computing a case study o...
Spatial related traffic sign inspection for inventory purposes using mobile l...
Standards for hybrid clouds
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Resource and instance hour minimization for deadline constrained dag applicat...
Reliable and confidential cloud storage with efficient data forwarding functi...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Scalable cloud–sensor architecture for the internet of things
Scalable algorithms for nearest neighbor joins on big trajectory data
Robust workload and energy management for sustainable data centers
Privacy preserving deep computation model on cloud for big data feature learning
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Protection of big data privacy
Power optimization with bler constraint for wireless fronthauls in c ran
Performance aware cloud resource allocation via fitness-enabled auction
Performance limitations of a text search application running in cloud instances
Performance analysis and optimal cooperative cluster size for randomly distri...
Predictive control for energy aware consolidation in cloud datacenters

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Types and Its function , kingdom of life
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
O7-L3 Supply Chain Operations - ICLT Program
PPH.pptx obstetrics and gynecology in nursing
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Sports Quiz easy sports quiz sports quiz
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O5-L3 Freight Transport Ops (International) V1.pdf
TR - Agricultural Crops Production NC III.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

K nearest neighbor classification over semantically secure encrypted relational data

  • 1. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data Abstract: Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy-preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud. The proposed protocol protects the confidentiality of data, privacy of user’s input query, and hides the data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the semi-honest model. Also, we empirically analyze the efficiency of our proposed protocol using a real- world dataset under different parameter settings.
  • 2. Existing System: Existing work on Privacy-Preserving Data Mining (either perturbation or secure multi-party computation based approach) cannot solve the DMED problem. Perturbed data do not possess semantic security, so data perturbation techniques cannot be used to encrypt highly sensitive data. Also the perturbed data do not produce very accurate data mining results. Secure multi-party computation (SMC) based approach assumes data are distributed and not encrypted at each participating party. As an emerging computing paradigm, cloud computing attracts many organizations to consider seriously regarding cloud potential in terms of its cost-efficiency, flexibility, and offload of administrative overhead. Most often, organizations delegate their computational operations in addition to their data to the cloud. Despite tremendous advantages that the cloud offers, privacy and security issues in the cloud are preventing companies to utilize those advantages. When data are highly sensitive, the data need to be encrypted before outsourcing to the cloud. However, when data are encrypted, irrespective of the underlying encryption scheme, performing any data mining tasks becomes very challenging without ever decrypting the data.
  • 3. Proposed System: We propose a novel PPkNN protocol, a secure k-NN classifier over semantically secure encrypted data. In our protocol, once the encrypted data are outsourced to the cloud, Alice does not participate in any computations. Therefore, no information is revealed to Alice. We emphasize that the intermediate results seen by the cloud in our protocol are either newly generated randomized encryptions or random numbers. Thus, which data records correspond to the k-nearest neighbors and the output class label are not known to the cloud. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb.
  • 4. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements: • Operating system : - Windows XP. • Front End : - .Net • Back End : - SQL Server