Solving Classification Issues Over Encrypted Data

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-35 Number-3
Year of Publication : 2016
Authors : Shubham Bhaskar, Arindam Das, Swarnika Shubham, Mrs. Sridevi G.M


Shubham Bhaskar, Arindam Das, Swarnika Shubham, Mrs. Sridevi G.M"Solving Classification Issues Over Encrypted Data", International Journal of Engineering Trends and Technology (IJETT), V35(3),135-138 May 2016. ISSN:2231-5381. published by seventh sense research group

Data Mining and Cloud computing are the two very technologies that makes the classification and storage of the data so simple. The classification tasks of data mining is very useful, however it leads to certain privacy issues. Hence, several solutions have been suggested over the years. With the invention of cloud computing users can now outsource their data over to the cloud along with several data mining tasks that can be performed there. Even if the cloud provides so splendid features, it however gives rise to certain security issues which makes data storage difficult. So, the data is uploaded over it in ‘encrypted form’ to ensure encryption of data. The classification technique, however, does not apply over the ‘encrypted data’. Hence, we aim to solve the classification (k-NN Classifier) problem over the encrypted data.


[1] National Institute of Standards and Technology`s (NIST) “definition of cloud”.
[2] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in ACM STOC, pp. 169–178, 2009.
[3] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, Nov. 1979.
[4] B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data.” print arXiv:1403.5001, 2014.
[5] R. Agrawal and R. Srikant, “Privacy- preserving data mining,” in ACM Sigmod Record, vol. 29, pp. 439–450, ACM, 2000.
[6] Y. Lindell and B. Pinkas, “Privacy preserving data mining,” in Advances in Cryptology (CRYPTO), pp. 36–54, Springer, 2000.
[17] L. Xiong, S. Chitti, and L. Liu, “K nearest neighbor classification across multiple private databases,” in CIKM, pp. 840–841, ACM, 2006.
[18] Y. Qi and M. J. Atallah, “Efficient privacy-preserving k-nearest neighbor search,” in IEEE n ICDCS, pp. 311–319, 2008.
[19] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in ACM SIGMOD, pp. 563– 574, 2004.
[20] H. Hacig¨um¨us¸, B. Iyer, C. Li, and S. Mehrotra, “Executing sql over encrypted data in the database-service-provider model,” in ACM SIGMOD, pp. 216–227, 2002.
[21] B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, “Secure multidimensional range queries over outsourced data,” The VLDB Journal, vol. 21, no. 3, pp. 333–358, 2012.
[22] W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, “Secure knn computation on encrypted databases,” in ACM SIGMOD, pp. 139–152, 2009.

Security, k-NN Classifier, Encryption