Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited

被引:0
|
作者
Zhu, Youwen [1 ,2 ]
Wang, Zhikuan [1 ]
Wang, Jian [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp, Nanjing, Jiangsu, Peoples R China
[2] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing, Jiangsu, Peoples R China
关键词
cloud computing; secure nearest neighbor query; collusion attack; security problems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is a challenging problem to securely resist the collusion of cloud server and query users while implementing nearest neighbor query over encrypted data in cloud. Recently, CloudBI-II is put forward to support nearest neighbor query on encrypted cloud data, and declared to be secure while cloud server colludes with some untrusted query users. In this paper, we propose an efficient attack method which indicates CloudBI-II will reveal the difference vectors under the collusion attack. Further, we show that the difference vector disclosure will result in serious privacy breach, and thus attain an efficient attack method to break CloudBI-II. Namely, CloudBI-II cannot achieve their declared security. Through theoretical analysis and experiment evaluation, we confirm our proposed attack approach can fast recover the original data from the encrypted data set in CloudBI-II. Finally, we provide an enhanced scheme which can efficiently resist the collusion attack.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud
    Zhu, Youwen
    Zhang, Yue
    Li, Xingxin
    Yan, Hongyang
    Li, Jing
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [2] Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data
    Li, Rui
    Liu, Alex X.
    Xu, Huanle
    Liu, Ying
    Yuan, Huaqiang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 91 - 106
  • [3] Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
    Zhu, Youwen
    Takagi, Tsuyoshi
    Hu, Rong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 326 - 330
  • [4] Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem
    Guo, Cheng
    Zhuang, Ruhan
    Su, Chunhua
    Liu, Charles Zhechao
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9868 - 9879
  • [5] Efficient and Secure Nearest Neighbor Search Over Encrypted Data in Cloud Environment
    Upinder, Kaur
    Pushpa, R. Suri
    [J]. DATA SCIENCE AND ANALYTICS, 2018, 799 : 587 - 598
  • [6] Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments
    Elmehdwi, Yousef
    Samanthula, Bharath K.
    Jiang, Wei
    [J]. 2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2014, : 664 - 675
  • [7] Secure Approximate Nearest Neighbor Search over Encrypted Data
    Gao, Yaqian
    Miao, Meixia
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 578 - 583
  • [8] Efficient Collusion-Resisting Secure Sum Protocol
    Zhu Youwen
    Huang Liusheng
    Yang Wei
    Yuan Xing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) : 407 - 413
  • [9] Efficient and Secure k-Nearest Neighbor Search over Encrypted Data in Public Cloud
    Song, Fuyuan
    Qin, Zheng
    Liu, Qin
    Liang, Jinwen
    Ou, Lu
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
    Xingxin Li
    Youwen Zhu
    Rui Xu
    Jian Wang
    Yushu Zhang
    [J]. Frontiers of Computer Science, 2024, 18