Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance

Because mobile terminals have limited computing and storage resources, individuals tend to outsource their data generated from mobile devices to clouds to do data operations. However, utilization of the abundant computation and storage resources of clouds may pose a threat to user's private data. In this paper, we focus on the issue of encrypted k‐nearest neighbor (kNN) classification on the cloud. In the past few years, many solutions were proposed to protect the user's privacy and data security. Unfortunately, most privacy‐preserving data mining schemes are not lightweight, which are not practical in real‐world applications. To solve this issue, we proposed a lightweight edge‐based kNN (EBkNN) classification scheme over encrypted cloud database utilizing edge computing technology. Our proposed scheme can provide several security guarantees: (i) user's data security, (ii) user's query privacy, and (iii) data access patterns. We analyzed the security of our scheme utilizing the semi‐honest security model and evaluated the performance using a synthetic dataset. The experiment results indicate that our scheme is more lightweight than the state‐of‐the‐art scheme.

[1]  Oded Goldreich General Cryptographic Protocols: The Very Basics , 2013, Secure Multi-Party Computation.

[2]  Tsuyoshi Takagi,et al.  Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..

[3]  Oded Goldreich Foundations of Cryptography: Encryption Schemes , 2004 .

[4]  Hong Rong,et al.  Fine-grained data access control with attribute-hiding policy for cloud-based IoT , 2019, Comput. Networks.

[5]  Wei Wu,et al.  Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT , 2020, IEEE Internet of Things Journal.

[6]  Keke Gai,et al.  Privacy‐preserving smart data storage for financial industry in cloud computing , 2018, Concurr. Comput. Pract. Exp..

[7]  Qing Yu,et al.  A multi‐dimensional index for privacy‐preserving queries in cloud computing , 2019, Concurr. Comput. Pract. Exp..

[8]  Xiaoqing Liu,et al.  A privacy‐preserving density peak clustering algorithm in cloud computing , 2020, Concurr. Comput. Pract. Exp..

[9]  Jian Liu,et al.  Reliable and confidential cloud storage with efficient data forwarding functionality , 2016, IET Commun..

[10]  Xuan Li,et al.  Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.

[11]  ChenXiao,et al.  Location privacy-preserving k nearest neighbor query under user's preference , 2016 .

[12]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[13]  Xiao Chen,et al.  Location privacy-preserving k nearest neighbor query under user's preference , 2016, Knowl. Based Syst..

[14]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[15]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[16]  Hong Rong,et al.  Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database , 2018, IEEE Access.

[17]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[18]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[19]  Rajarshi Shahu,et al.  K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2016 .

[20]  Tsuyoshi Takagi,et al.  Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data , 2014, IEICE Trans. Inf. Syst..

[21]  Dong Hoon Lee,et al.  Privacy Preserving k-Nearest Neighbor for Medical Diagnosis in e-Health Cloud , 2018, Journal of healthcare engineering.

[22]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[23]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[24]  Bing Chen,et al.  LPDA-EC: A Lightweight Privacy-Preserving Data Aggregation Scheme for Edge Computing , 2018, 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[25]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[26]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[27]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[28]  Yvo Desmedt,et al.  Encryption Schemes , 1999, Algorithms and Theory of Computation Handbook.

[29]  Nong Xiao,et al.  Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage , 2018, Sensors.

[30]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[31]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.