Future of Information and Communication Conference (FICC) 2023
2-3 March 2023
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2018.090446
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 9 Issue 4, 2018.
Abstract: Cloud computing becomes essential in these days for the enterprises. Most of the large companies are moving their services and data to the cloud servers which offer flexibility and efficiency. Data owner (DO) hires a cloud service provider (CSP) to store its data and carry out the related computation. The query owner (QO) sends a request which is crucial for its future plans to the CSP. The CSP computes all necessary calculations and returns the result back to the QO. Neither the data nor query owners want to reveal their private data to anyone. k-Nearest Neighbour (k-NN) interpolation is one of the essential algorithms to produce a prediction value for an unmeasured location. Simply, it finds k number of nearest neighbours around the query point to produce an output. Oblivious RAM (ORAM) has been used to protect the privacy in cloud computing. In our work, we will perform the k-NN method using the kd-tree and ORAM without revealing both the data-owner’s and query owner’s confidential data to each other or to third parties. The proposed solution will be analysed to ensure that it provides accurate and reliable predictions while preserving the privacy of all parties.
Muhammad Rifthy Kalideen and Bulent Tugrul, “Outsourcing of Secure k-Nearest Neighbours Interpolation Method” International Journal of Advanced Computer Science and Applications(IJACSA), 9(4), 2018. http://dx.doi.org/10.14569/IJACSA.2018.090446
@article{Kalideen2018,
title = {Outsourcing of Secure k-Nearest Neighbours Interpolation Method},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2018.090446},
url = {http://dx.doi.org/10.14569/IJACSA.2018.090446},
year = {2018},
publisher = {The Science and Information Organization},
volume = {9},
number = {4},
author = {Muhammad Rifthy Kalideen and Bulent Tugrul}
}