Secure KNN Computation on Cloud

被引:0
|
作者
Sanyashi, Tikaram [1 ]
Boran, Nirmal Kumar [2 ]
Singh, Virendra [3 ]
机构
[1] NTNU, Dept Informat Secur & Commun Technol, Trondheim, Norway
[2] NIT Calicut, Dept Comp Sci & Engn, Kozhikode, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Mumbai, Maharashtra, India
来源
关键词
Privacy preserving; k-NN; Cloud computing; Encrypted Data; ENCRYPTED DATA; SEARCH;
D O I
10.1007/978-3-031-49099-6_12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has emerged as a trend of outsourcing database and query services to a powerful cloud to ease local storage and computing pressure. However, private data storage and computation in the cloud come with a risk of losing the privacy and confidentiality of the data. Thus, sensitive applications running on the cloud require to be encrypted before storing it in the cloud. Additionally, to run some data mining algorithms, viz., k-NN requires the data to be in the encrypted domain computation-friendly ciphertext form. Thus, data are encrypted using a searchable encryption scheme before outsourcing it into the cloud. Asymmetric scalar-product-preserving encryption (ASPE) scheme provides secure k-nearest neighbors computation that is designed to provide both Data Privacy and Query Privacy. However, this scheme assumed that the query users were trusted entities. Enhancements to this work further showed that trusted query user assumption is no longer necessary if we use the Paillier cryptosystem. In this work, we have shown that even if we do not use the Paillier cryptosystem, query privacy in the cryptosystem can be achieved using the ASPE technique alone. Using ASPE for query encryption reduces the query encryption time, further improving the practicality of the encryption scheme.
引用
收藏
页码:197 / 216
页数:20
相关论文
共 50 条
  • [1] Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud
    Hong, Jun
    Wen, Tao
    Guo, Quan
    Ye, Zhengwang
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [2] A Probabilistic Approach for Secure and Verifiable Computation of kNN Queries in Cloud
    Sundarapandi, Gowri Pandian
    Bokhary, Salma
    Samanthula, Bharath K.
    Dong, Boxiang
    [J]. 2023 IEEE CLOUD SUMMIT, 2023, : 15 - 20
  • [3] Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Wu, Wei
    Xian, Ming
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 236 - 243
  • [4] Secure kNN Computation on Encrypted Databases
    Wong, W. K.
    Cheung, David W.
    Kao, Ben
    Mamoulis, Nikos
    [J]. ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 139 - 152
  • [5] Fast and Secure kNN Query Processing in Cloud Computing
    Lei, Xinyu
    Tu, Guan-Hua
    Liu, Alex X.
    Xie, Tian
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [6] Secure kNN Query Processing in Untrusted Cloud Environments
    Choi, Sunoh
    Ghinita, Gabriel
    Lim, Hyo-Sang
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) : 2818 - 2831
  • [7] Secure multiparty computation in cloud computing
    Jiang, Han
    Xu, Qiuliang
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [8] Secure KNN Set Similarity Search in Outsourced Cloud Environments
    Li, Lu
    Jiang, Xufeng
    Gao, Ge
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 474 - 479
  • [9] Known-plaintext attack on secure kNN computation on encrypted databases
    Gu Chunsheng
    Gu Jixing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2432 - 2441
  • [10] Secure Cloud Control Using Verifiable Computation
    Mahfouzi, Rouhollah
    Aminifar, Amir
    Samii, Soheil
    Eles, Petru
    Peng, Zebo
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 21 - 26