Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

被引:5
|
作者
Cheng, Xiang [1 ]
Su, Sen [1 ]
Teng, Yiping [1 ]
Xiao, Ke [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
k-nearest neighbors; data privacy; cloud computing; SEARCH SERVICES;
D O I
10.1002/sec.1245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With rapid advances in wireless communication, mobile devices and positioning technologies, location-based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS providers may outsource their data services to the cloud. However, to protect data privacy, sensitive data have to be encrypted before outsourcing, which may impede the functionality and performance of the data services. In this paper, to make one step closer towards practical deployment of LBS in the cloud, we study the problem of secure and efficient k-nearest neighbor (kNN) query processing over encrypted spatial data. Although there exist a number of studies on kNN query processing over encrypted data, few of them can provide security and efficiency simultaneously. To this end, we present a secure and efficient kNN query (SEkQ) scheme. In this scheme, a new encryption method, namely, asymmetric scalar-product-preserving encryption with Laplace noise (ASPELN) is proposed, which can resist both the chosen-plaintext and known-plaintext attacks. Based on ASPELN, an encrypted hierarchical index called SR-tree (short for Secure R-tree) is devised to facilitate efficient kNN query processing on encrypted spatial data. To search with the SR-tree index, two effective methods, namely, anchor-assisted position determination and position-distinguished trapdoor generation are proposed for the distance computations between the query point and SR-tree nodes under encryption. Thorough analysis shows the validity and security of the proposed scheme. Extensive experimental results on real datasets further demonstrate the proposed scheme can achieve high efficiency and good scalability. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3205 / 3218
页数:14
相关论文
共 50 条
  • [1] Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing
    Li, Rui
    Liu, Alex X.
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 697 - 708
  • [2] Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud
    Almakdi, Sultan
    Panda, Brajendra
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 120 - 127
  • [3] Towards efficient Secure Boolean Range Query over encrypted spatial data
    Zhao, Xuan
    Yu, Jia
    Ge, Xinrui
    Hao, Rong
    COMPUTERS & SECURITY, 2024, 136
  • [4] Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
    Xu, Guowen
    Li, Hongwei
    Dai, Yuanshun
    Yang, Kan
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 870 - 885
  • [5] Efficient and Secure Spatial Range Query over Large-scale Encrypted Data
    Miao, Yinbin
    Xu, Chao
    Zheng, Yifeng
    Liu, Ximeng
    Meng, Xiangdong
    Deng, Robert H.
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 271 - 281
  • [6] Facilitating Secure and Efficient Spatial Query Processing on the Cloud
    Talha, Ayesha
    Kamel, Ibrahim
    Al Aghbari, Zaher
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (04) : 988 - 1001
  • [7] Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Zhang, Ji
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 131 : 44 - 54
  • [8] Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud
    Li, Meng
    Gao, Jianbo
    Zhu, Liehuang
    Zhang, Zijian
    Lal, Chhagan
    Conti, Mauro
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 1239 - 1251
  • [9] Enabling secure and efficient multi-keyword fuzzy retrieval over encrypted data in cloud
    Shi, Chenghua (chenghuashi@hebeu.edu.cn), 1629, ICIC Express Letters Office (07):
  • [10] Fast and Secure kNN Query Processing in Cloud Computing
    Lei, Xinyu
    Tu, Guan-Hua
    Liu, Alex X.
    Xie, Tian
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,