Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

被引:5
|
作者
Cheng, Xiang [1 ]
Su, Sen [1 ]
Teng, Yiping [1 ]
Xiao, Ke [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
k-nearest neighbors; data privacy; cloud computing; SEARCH SERVICES;
D O I
10.1002/sec.1245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With rapid advances in wireless communication, mobile devices and positioning technologies, location-based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS providers may outsource their data services to the cloud. However, to protect data privacy, sensitive data have to be encrypted before outsourcing, which may impede the functionality and performance of the data services. In this paper, to make one step closer towards practical deployment of LBS in the cloud, we study the problem of secure and efficient k-nearest neighbor (kNN) query processing over encrypted spatial data. Although there exist a number of studies on kNN query processing over encrypted data, few of them can provide security and efficiency simultaneously. To this end, we present a secure and efficient kNN query (SEkQ) scheme. In this scheme, a new encryption method, namely, asymmetric scalar-product-preserving encryption with Laplace noise (ASPELN) is proposed, which can resist both the chosen-plaintext and known-plaintext attacks. Based on ASPELN, an encrypted hierarchical index called SR-tree (short for Secure R-tree) is devised to facilitate efficient kNN query processing on encrypted spatial data. To search with the SR-tree index, two effective methods, namely, anchor-assisted position determination and position-distinguished trapdoor generation are proposed for the distance computations between the query point and SR-tree nodes under encryption. Thorough analysis shows the validity and security of the proposed scheme. Extensive experimental results on real datasets further demonstrate the proposed scheme can achieve high efficiency and good scalability. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3205 / 3218
页数:14
相关论文
共 50 条
  • [31] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [32] Secure Cloud Auditing over Encrypted Data
    Shaikh, Sarah
    Vora, Deepali
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 693 - 697
  • [33] Voronoi-based Secure kNN Queries over Spatial Data at the Cloud
    Habeeb, Eva
    Talha, Ayesha M.
    Kamel, Ibrahim
    Al Aghbari, Zaher
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2018, : 13 - 17
  • [34] Secure Query Processing Over Encrypted Database Through CryptDB
    Kumar, Ashutosh
    Hussain, Muzzammil
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 307 - 319
  • [35] When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
    Sun, Wenhai
    Zhang, Ning
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [36] MixGeo: Efficient Secure Range Queries on Encrypted Dense Spatial Data in the Cloud
    Guo, Ruoyang
    Qin, Bo
    Wu, Yuncheng
    Liu, Ruixuan
    Chen, Hong
    Li, Cuiping
    PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS 2019), 2019,
  • [37] Efficient and Secure Nearest Neighbor Search Over Encrypted Data in Cloud Environment
    Upinder, Kaur
    Pushpa, R. Suri
    DATA SCIENCE AND ANALYTICS, 2018, 799 : 587 - 598
  • [38] Secure and controllable k-NN query over encrypted cloud data with key confidentiality
    Zhu, Youwen
    Huang, Zhiqiu
    Takagi, Tsuyoshi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016, 89 : 1 - 12
  • [39] Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud
    Zhu, Youwen
    Zhang, Yue
    Li, Xingxin
    Yan, Hongyang
    Li, Jing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [40] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235