Prıvacy-Preservıng K-Nearest Neıghbour Interpolatıon Method ın an Outsourced Envıronment

dc.contributor.authorKALIDEEN, Muhammad Rifthy
dc.contributor.authorOsmanoğlu, Murat
dc.contributor.authorTuğrul, Bülent
dc.contributor.departmentBilgisayar Mühendisliğitr_TR
dc.contributor.facultyMühendislik Fakültesitr_TR
dc.date.accessioned2021-11-30T10:53:12Z
dc.date.available2021-11-30T10:53:12Z
dc.date.issued2019-06-30
dc.description.abstractOne of the most emerging computer technologies of this decade is cloud computing that allows data owners to outsource their storage and computing requirements. It enables data owners to avoid the costs of building and maintaining a private storage infrastructure. While outsourcing data to cloud promises significant benefits, it possesses substantial security and privacy concerns, especially when data stored in the cloud is sensitive and confidential, like a business plan. Encrypting the data before outsourcing can ensure privacy. However, it will be very difficult to process the cipher text created by the traditional encryption method. Considering this fact, we propose an efficient protocol that allows a query owner to retrieve the interpolation of the top k records from two different databases that are closest to a query point. Note that the databases are stored in two different cloud service providers in encrypted form. We also show that the proposed protocol ensures the privacy and the security of the data and the query point.tr_TR
dc.description.indexTrdizintr_TR
dc.identifier.endpage11tr_TR
dc.identifier.issn/e-issn2618-6462
dc.identifier.issue1tr_TR
dc.identifier.startpage1tr_TR
dc.identifier.urihttp://hdl.handle.net/20.500.12575/76509
dc.identifier.volume61tr_TR
dc.language.isoentr_TR
dc.publisherAnkara Üniversitesi Mühendislik Fakültesitr_TR
dc.relation.journalCommunications Faculty of Sciences University of Ankara Series A2-A3 Physical Sciences and Engineeringtr_TR
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıtr_TR
dc.subjectSpatial interpolationtr_TR
dc.subjectk-NNtr_TR
dc.subjectHomomorphic encryptiontr_TR
dc.titlePrıvacy-Preservıng K-Nearest Neıghbour Interpolatıon Method ın an Outsourced Envıronmenttr_TR
dc.typeArticletr_TR

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
41.pdf
Size:
785.5 KB
Format:
Adobe Portable Document Format
Description:
Dergi
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: