A Privacy Preserving Cloud-Based K-NN Search Scheme with Lightweight User Loads

被引:7
|
作者
Hsu, Yeong-Cherng [1 ]
Hsueh, Chih-Hsin [2 ]
Wu, Ja-Ling [3 ]
机构
[1] MediaTek Inc, Hsinchu 30078, Taiwan
[2] Natl Taiwan Univ, Grad Inst Networking & Multimedia, Taipei 10617, Taiwan
[3] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei 10617, Taiwan
关键词
K-NN; privacy preserving; cloud; encryption; security; ACCESS-CONTROL;
D O I
10.3390/computers9010001
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the growing popularity of cloud computing, it is convenient for data owners to outsource their data to a cloud server. By utilizing the massive storage and computational resources in cloud, data owners can also provide a platform for users to make query requests. However, due to the privacy concerns, sensitive data should be encrypted before outsourcing. In this work, a novel privacy preserving K-nearest neighbor (K-NN) search scheme over the encrypted outsourced cloud dataset is proposed. The problem is about letting the cloud server find K nearest points with respect to an encrypted query on the encrypted dataset, which was outsourced by data owners, and return the searched results to the querying user. Comparing with other existing methods, our approach leverages the resources of the cloud more by shifting most of the required computational loads, from data owners and query users, to the cloud server. In addition, there is no need for data owners to share their secret key with others. In a nutshell, in the proposed scheme, data points and user queries are encrypted attribute-wise and the entire search algorithm is performed in the encrypted domain; therefore, our approach not only preserves the data privacy and query privacy but also hides the data access pattern from the cloud server. Moreover, by using a tree structure, the proposed scheme could accomplish query requests in sub-liner time, according to our performance analysis. Finally, experimental results demonstrate the practicability and the efficiency of our method.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] LPCQP: Lightweight Private Circular Query Protocol for Privacy-Preserving k-NN Search
    Utsunomiya, Yasuhito
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. 2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 59 - 64
  • [2] An Efficient and Privacy-Preserving k-NN Query Scheme for eHealthcare Data
    Zheng, Yandong
    Lu, Rongxing
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 358 - 365
  • [3] Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark
    Dritsas, Elias
    Kanavos, Andreas
    Trigka, Maria
    Vonitsanos, Gerasimos
    Sioutas, Spyros
    Tsakalidis, Athanasios
    [J]. ALGORITHMS, 2020, 13 (08)
  • [4] Preserving user query privacy in cloud-based security services
    Chen, Yen-Chung
    Wu, Yu-Sung
    Tzeng, Wen-Guey
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 997 - 1024
  • [5] A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search
    Lien, I. -Ting
    Lin, Yu-Hsun
    Shieh, Jyh-Ren
    Wu, Ja-Ling
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 863 - 873
  • [6] PRIVACY-PRESERVING K-NN COMPUTATION OVER ENCRYPTED CLOUD DATA WITHOUT KEY SHARING
    Wang, ShaoHui
    Liu, Tian
    Xiao, Fu
    Wang, Ruchuan
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 398 - 403
  • [7] Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
    Lian, Huijuan
    Qiu, Weidong
    Yan, Di
    Huang, Zheng
    Guo, Jie
    [J]. COMPLEXITY, 2017,
  • [8] Privacy-Preserving K-NN Classification Using Vector Operations
    Jalla, Hanumantharao
    Girija, P. N.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR COMPETITIVE STRATEGIES, 2019, 40 : 655 - 664
  • [9] Trajectory Clustering and k-NN for Robust Privacy Preserving Spatiotemporal Databases
    Dritsas, Elias
    Trigka, Maria
    Gerolymatos, Panagiotis
    Sioutas, Spyros
    [J]. ALGORITHMS, 2018, 11 (12):
  • [10] Non-interactive Privacy-preserving k-NN Classifier
    Pereira, Hilder V. L.
    Aranha, Diego F.
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 362 - 371