Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

被引:5
|
作者
Cheng, Xiang [1 ]
Su, Sen [1 ]
Teng, Yiping [1 ]
Xiao, Ke [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
k-nearest neighbors; data privacy; cloud computing; SEARCH SERVICES;
D O I
10.1002/sec.1245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With rapid advances in wireless communication, mobile devices and positioning technologies, location-based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS providers may outsource their data services to the cloud. However, to protect data privacy, sensitive data have to be encrypted before outsourcing, which may impede the functionality and performance of the data services. In this paper, to make one step closer towards practical deployment of LBS in the cloud, we study the problem of secure and efficient k-nearest neighbor (kNN) query processing over encrypted spatial data. Although there exist a number of studies on kNN query processing over encrypted data, few of them can provide security and efficiency simultaneously. To this end, we present a secure and efficient kNN query (SEkQ) scheme. In this scheme, a new encryption method, namely, asymmetric scalar-product-preserving encryption with Laplace noise (ASPELN) is proposed, which can resist both the chosen-plaintext and known-plaintext attacks. Based on ASPELN, an encrypted hierarchical index called SR-tree (short for Secure R-tree) is devised to facilitate efficient kNN query processing on encrypted spatial data. To search with the SR-tree index, two effective methods, namely, anchor-assisted position determination and position-distinguished trapdoor generation are proposed for the distance computations between the query point and SR-tree nodes under encryption. Thorough analysis shows the validity and security of the proposed scheme. Extensive experimental results on real datasets further demonstrate the proposed scheme can achieve high efficiency and good scalability. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3205 / 3218
页数:14
相关论文
共 50 条
  • [21] Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem
    Guo, Cheng
    Zhuang, Ruhan
    Su, Chunhua
    Liu, Charles Zhechao
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9868 - 9879
  • [22] Secure kNN query of outsourced spatial data using two-cloud architecture
    Ghunaim, Tasneem
    Kamel, Ibrahim
    Al Aghbari, Zaher
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (18): : 21310 - 21345
  • [23] Secure kNN query of outsourced spatial data using two-cloud architecture
    Tasneem Ghunaim
    Ibrahim Kamel
    Zaher Al Aghbari
    The Journal of Supercomputing, 2023, 79 : 21310 - 21345
  • [24] Efficient Rank Based KNN Query Processing Over Uncertain Data
    Zhang, Ying
    Lin, Xuemin
    Zhu, Gaoping
    Zhang, Wenjie
    Lin, Qianlu
    26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING ICDE 2010, 2010, : 28 - 39
  • [25] Efficient and Secure kNN Classification over Encrypted Data using Vector Homomorphic Encryption
    Yang, Haomiao
    He, Weichao
    Li, Jie
    Li, Hongwei
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [26] Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
    Hyeong-Jin Kim
    Hyunjo Lee
    Yong-Ki Kim
    Jae-Woo Chang
    The Journal of Supercomputing, 2022, 78 : 9245 - 9284
  • [27] Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing
    Kim, Hyeong-Jin
    Lee, Hyunjo
    Kim, Yong-Ki
    Chang, Jae-Woo
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (07): : 9245 - 9284
  • [28] Enabling efficient and verifiable secure search on cloud-based encrypted big data
    Du, Ruizhong
    Yu, Chenghao
    Li, Mingyue
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2574 - 2590
  • [29] Enabling efficient and verifiable secure search on cloud-based encrypted big data
    Ruizhong Du
    Chenghao Yu
    Mingyue Li
    Peer-to-Peer Networking and Applications, 2023, 16 : 2574 - 2590
  • [30] RETRACTION: Query processing over secure perturbed data over hybrid cloud
    Vulapula, S. R.
    Malladi, S.
    INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2024,