Use of Class Dependent Features in K-NN Classifier for the Classification of Encrypted Data

Authors

  • Nayana Jangale  Computer Department, Research Scholar, SSBTCOET Jalgaon, Maharashtra, India
  • Sandip Patil  Computer Department, Associate Professor, SSBTCOET Jalgaon, Maharashtra, India

Keywords:

Cloud Computing, Features Selection, Privacy-Preserving, Data Encryption, Machine Learning

Abstract

Cloud Computing stores the data in encrypted form. Classification of the data is required in many machine learning applications, so in the field of cloud computing, classification of the encrypted data is one of the major challenges. Extracting the class dependent features from the encrypted data and using these features in a well-known K-NN classifier can be used to classify the encrypted data at the cloud. In the proposed work we have encrypted and data extracted the correlation coefficient between the two or more variables and feeding it into the K-NN classifier and classifying the data. We have calculated the precision, recall, F1 score and accuracy of the proposed system and evaluated the performance of it with SVM and Naïve Byes classifiers.

References

  1. P. Song, C. Geng and Z. Li, "Research on Text Classification Based on Convolutional Neural Network," 2019 International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi'an, China, 2019, pp. 229-232, doi: 10.1109/ICCNEA.2019.00052.
  2. S. De Capitani di Vimercati, S. Foresti, and P. Samarati, “Managing and accessing data in the cloud: Privacy risks and approaches,” in CRiSIS, pp. 1 –9, 2012.
  3. H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism,” in Proc. IEEE 27th Int. Conf. Data Eng., 2011, pp. 601–612.
  4. P. Paillier, “Public key cryptosystems based on composite degree residuosity classes,” in Encrypt, pp. 223–238, 1999.
  5. B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data.” E-print arXiv:1403.5001, 2014.
  6. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in ACM STOC, pp. 169–178, 2009.
  7. C. Gentry and S. Halevi, “Implementing gentry’s fully- homomorphic encryption scheme,” in EUROCRYPT, pp. 129– 148, Springer, 2011.
  8. A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, 1979.
  9. D. Bogdanov, S. Laur, and J. Willemson, “Sharemind: A framework for fast privacy-preserving computations, “in Proc. 13th Eur.Symp. Res. Computer Security, 2008, pp. 192–206.
  10. R. Agrawal and R. Srikant, “Privacy-preserving data mining,” ACM Sigmod Rec., vol. 29, pp. 439–450, 2000.
  11. P. Zhang, Y. Tong, S. Tang, and D. Yang, “Privacy preserving Naive Bayes classification,” in Proc. 1st Int. Conf. Adv. Data Mining Appl., 2005, pp. 744-752.
  12. A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules,” Inf. Syst., vol. 29, no. 4, pp. 343-364, 2004.
  13. R. J. Bayardo and R. Agrawal, “Data privacy through optimal k-anonymization,” in Proc. IEEE 21st Int. Conf. Data Eng., 2005, pp. 217-228.
  14. M. Kantarcioglu and C. Clifton, “Privately computing a distributed k-nn classifier,” in Proc. 8th Eur. Conf. Principles Practice Knowl. Discovery Databases, 2004, pp. 279-290.
  15. Y. Elmehdwi, B. K. Samanthula, and W. Jiang, “Secure k-nearest neighbor query over encrypted data in outsourced environments,” in Proc. IEEE 30th Int. Conf. Data Eng., 2014, pp. 664-675.
  16. Manek, A.S., Shenoy, P.D., Mohan, M.C. et al. Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier. World Wide Web 20, 135–154 (2017).
  17. K. Huang, H. Jiang and X. Zhang, "Field Support Vector Machines," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 1, no. 6, pp. 454-463, Dec. 2017, doi: 10.1109/TETCI.2017.2751062.

Downloads

Published

2022-04-30

Issue

Section

Research Articles

How to Cite

[1]
Nayana Jangale, Sandip Patil, " Use of Class Dependent Features in K-NN Classifier for the Classification of Encrypted Data, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 2, pp.44-50, March-April-2022.