2020
DOI: 10.1002/cpe.5804
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance

Abstract: Summary Because mobile terminals have limited computing and storage resources, individuals tend to outsource their data generated from mobile devices to clouds to do data operations. However, utilization of the abundant computation and storage resources of clouds may pose a threat to user's private data. In this paper, we focus on the issue of encrypted k‐nearest neighbor (kNN) classification on the cloud. In the past few years, many solutions were proposed to protect the user's privacy and data security. Unfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 28 publications
(39 reference statements)
0
3
0
Order By: Relevance
“…Y. Tan et al proposed a lightweight edge-based privacy-preserving kNN classification algorithm over a hybrid encrypted cloud database [ 24 ]. A data owner can upload his/her database to the cloud server, and an authorized user can send a query to the cloud server to execute kNN queries.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Y. Tan et al proposed a lightweight edge-based privacy-preserving kNN classification algorithm over a hybrid encrypted cloud database [ 24 ]. A data owner can upload his/her database to the cloud server, and an authorized user can send a query to the cloud server to execute kNN queries.…”
Section: Background and Related Workmentioning
confidence: 99%
“…We explain their comparison with respect to three major factors. First, B. K. Samanthula et al’s work [ 16 ], H. Kim et al’s work [ 17 ], W. Wu et al’s work [ 23 ] and Y. Tan et al’s work [ 24 ] support hiding access pattern, while B. Yao et al’s work [ 21 ] and J. Du and F. Bian’s work [ 25 ] do not support it.…”
Section: Background and Related Workmentioning
confidence: 99%
“…But the k-anonymity results in temporal attack due to dynamic data collection [ 17 ]. Light weight edge-based classifier method is applied over the encrypted data using edge computing which has paved the way for data security and user query privacy [ 18 ]. This Anonymity is often considered only for the attributes containing the information for differentiating a particular sample from the simple set.…”
Section: Related Workmentioning
confidence: 99%