Secure and Efficient k-NN Queries.

ICT Syst Secur Priv Prot (2017)

MSIS Department, Rutgers University, USA.

Published: May 2017

Given the morass of available data, ranking and best match queries are often used to find records of interest. As such, k-NN queries, which give the k closest matches to a query point, are of particular interest, and have many applications. We study this problem in the context of the financial sector, wherein an investment portfolio database is queried for matching portfolios. Given the sensitivity of the information involved, our key contribution is to develop a secure k-NN computation protocol that can enable the computation k-NN queries in a distributed multi-party environment while taking domain semantics into account. The experimental results show that the proposed protocols are extremely efficient.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5713910PMC
http://dx.doi.org/10.1007/978-3-319-58469-0_11DOI Listing

Publication Analysis

Top Keywords

k-nn queries
12
secure efficient
4
k-nn
4
efficient k-nn
4
queries
4
queries morass
4
morass data
4
data ranking
4
ranking best
4
best match
4

Similar Publications

Background: Literature reviews (LRs) identify, evaluate, and synthesize relevant papers to a particular research question to advance understanding and support decision-making. However, LRs, especially traditional systematic reviews, are slow, resource-intensive, and become outdated quickly.

Objective: LiteRev is an advanced and enhanced version of an existing automation tool designed to assist researchers in conducting LRs through the implementation of cutting-edge technologies such as natural language processing and machine learning techniques.

View Article and Find Full Text PDF

The exponential rise in advanced software computing and low-cost hardware has broadened the horizon for the Internet of Medical Things (IoMT), interoperable e-Healthcare systems serving varied purposes including electronic healthcare records (EHRs) and telemedicine. However, being heterogeneous and dynamic in nature, their database security remains a challenge forever. Numerous intrusion attacks including bot-attack and malware have confined major classical databases towards e-Healthcare.

View Article and Find Full Text PDF

Privacy-preserving -NN interpolation over two encrypted databases.

PeerJ Comput Sci

May 2022

Department of Computer Engineering, Ankara University, Ankara, Turkey.

Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns.

View Article and Find Full Text PDF

Updatable privacy-preserving -nearest neighbor query in location-based s-ervice.

Peer Peer Netw Appl

January 2022

The State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, 710071 China.

Article Synopsis
  • - The k-nearest neighbor (k-NN) query is vital for location-based services as it helps find the closest points to a specified location, enhancing services like interest recommendations, but raises privacy concerns about stored location data.
  • - Most current privacy protection methods don't adequately safeguard the actual location points on servers or don't allow updates to these points, prompting the need for better solutions.
  • - This paper introduces a new privacy-preserving k-NN query method that utilizes a D-tree for storing location data and employs advanced encryption techniques, achieving over 95% accuracy while allowing updates to location points.
View Article and Find Full Text PDF

In pattern classification, we may have a few labeled data points in the target domain, but a number of labeled samples are available in another related domain (called the source domain). Transfer learning can solve such classification problems via the knowledge transfer from source to target domains. The source and target domains can be represented by heterogeneous features.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!