2020
DOI: 10.1109/access.2020.2986245
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving and Efficient k-Nearest Neighbor Query and Classification Scheme Based on k-Dimensional Tree for Outsourced Data

Abstract: Cloud computing technology has attracted the attention of researchers and organizations due to its computing power, computing efficiency and flexibility. Using cloud computing technology to analysis outsourced data has become a new data utilization model. However, due to the severe security risks that appear in cloud computing, most organizations now encrypt data before outsourcing data. Therefore, in recent years, many new works on the k-Nearest Neighbor (denoted by k-NN) algorithm for encrypted data has appe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…At first, a K-D (K-Dimensional) tree of point features is constructed [27], and all data are divided into left and a right subtrees according to their spatial location. Then, the same operations are conducted on the data in the subtrees until all points have been processed.…”
Section: Point Feature Matchingmentioning
confidence: 99%
“…At first, a K-D (K-Dimensional) tree of point features is constructed [27], and all data are divided into left and a right subtrees according to their spatial location. Then, the same operations are conducted on the data in the subtrees until all points have been processed.…”
Section: Point Feature Matchingmentioning
confidence: 99%
“…A preprocessing step that converts RGB images to grayscale ones is required before feature extraction. For classification, we use the SVM classifier [32] and the k-NN classifier Cunningham and Delany [30] combined with the KD-Tree [31]. In fact, the KD-Tree is a structure used to organize data in a K-dimensional space according to their spatial distribution.…”
Section: Feature Extraction and Classificationmentioning
confidence: 99%
“…For feature extraction, we utilize two different features: (1) hand-crafted features by exploiting the most used and efficient descriptors, which are the SURF Özdemir et al [27] and the HOG [28], and (2) learned features extracted from the final layers of the pre-trained Inception-v3 architecture model [29]. As regards classification, our suggested method is evaluated by using the k Nearest Neighbors (k-NN) Cunningham and Delany [30] combined with the K Dimensional Tree (KD-Tree) [31] and Support Vector Machine (SVM) [32] classifiers as classical methods and the pre-trained Inception-v3 model as a deep learning method.…”
Section: Introductionmentioning
confidence: 99%
“…The Best Bin First (BBF) search algorithm is a search algorithm developed for K-D tree structures. It outperforms the K-D tree search algorithm in terms of processing high-dimensional features [20]. It pushes points that can be traced into a sequence, and sorts these points, according to their distances from a hyperplane.…”
Section: Rough Matching Strategy 231 Bbf Search Strategymentioning
confidence: 99%