Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud

被引:0
|
作者
Li, Meng [1 ,2 ,3 ,4 ]
Gao, Jianbo [2 ,5 ]
Zhu, Liehuang [5 ]
Zhang, Zijian [6 ,7 ]
Lal, Chhagan [8 ,9 ]
Conti, Mauro [8 ,9 ,10 ]
机构
[1] Hefei Univ Technol, Key Lab Knowledge Engn Big Data, Minist Educ, Hefei 230601, Anhui, Peoples R China
[2] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei 230601, Anhui, Peoples R China
[3] Anhui Prov Key Lab Ind Safety & Emergency Technol, Hefei 230601, Anhui, Peoples R China
[4] Hefei Univ Technol, Intelligent Interconnected Syst Lab Anhui Prov, Hefei 230601, Anhui, Peoples R China
[5] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Xiamen 351100, Fujian, Peoples R China
[6] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100811, Peoples R China
[7] Beijing Inst Technol, Southeast Inst Informat Technol, Xiamen 351100, Fujian, Peoples R China
[8] Univ Padua, Dept Math, I-35131 Padua, Italy
[9] Univ Padua, HIT Ctr, I-35131 Padua, Italy
[10] Delft Univ Technol, Dept Intelligent Syst, Cyber Secur Grp, NL-2628 CD Delft, Netherlands
基金
中国国家自然科学基金;
关键词
Query processing; Indexes; Data privacy; Encoding; Servers; Privacy; Computational modeling; Efficiency; query processing; security; time-restricted access; verification; PRIVACY;
D O I
10.1109/TSC.2023.3311586
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing data users' location data to a cloud server (CS) enables them to obtain $k$k nearest points of interest. However, data users' privacy concerns hinder the wide-scale use. Several studies have achieved Secure k Nearest Neighbor (SkNN) query, but do not address time-restricted access or result privacy, and randomly partition data items which degrades efficiency. In this article, we propose Time-restricted, verifiable, and efficient Query Processing (TiveQP). TiveQP has three distinguishing features. 1) Expand SkNN: data users can query $k$k nearest locations open at a specific time. 2) Adopt a stronger threat model: we assume the CS is malicious and propose complementary set (i.e., transform proving "in" a set to proving "in" its complementary set) to allow data users to verify results without leaking unqueried data items' information. 3) Improve efficiency: we design a space encoding technique and a pruning strategy to improve efficiency in query processing and result verification. We formally proved the security of TiveQP in the random oracle model. We conducted extensive evaluations over a Yelp dataset to show that TiveQP significantly improves over existing work, e.g., top-10NN query over 100 thousand data items only needs 10 ms to get queried results and 1.4 ms for verification.
引用
收藏
页码:1239 / 1251
页数:13
相关论文
共 50 条
  • [1] Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET
    Meng, Qian
    Weng, Jian
    Miao, Yinbin
    Chen, Kefei
    Shen, Zhonghua
    Wang, Fuqun
    Li, Zhijun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 12342 - 12357
  • [2] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218
  • [3] EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data
    Guan, Yunguo
    Xiong, Pulei
    Lu, Rongxing
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 553 - 558
  • [4] EVSS: An efficient verifiable search scheme over encrypted cloud data
    Qian Zhou
    Hua Dai
    Wenjie Sheng
    Yuanlong Liu
    Geng Yang
    [J]. World Wide Web, 2023, 26 : 1459 - 1479
  • [5] Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Zhiquan
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 839 - 853
  • [6] EVSS: An efficient verifiable search scheme over encrypted cloud data
    Zhou, Qian
    Dai, Hua
    Sheng, Wenjie
    Liu, Yuanlong
    Yang, Geng
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (04): : 1459 - 1479
  • [7] Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation
    Purushothama, B. R.
    Amberker, B. B.
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 88 - 95
  • [8] Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
    Shao, Jun
    Lu, Rongxing
    Guan, Yunguo
    Wei, Guiyi
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 124 - 137
  • [9] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [10] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,