Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner

被引:40
|
作者
Zhou, Lu [1 ,2 ]
Zhu, Youwen [2 ,3 ]
Castiglione, Aniello [4 ]
机构
[1] Shandong Univ, Jinan 250100, Shandong, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Jiangsu, Peoples R China
[3] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 210021, Jiangsu, Peoples R China
[4] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
基金
中国国家自然科学基金;
关键词
Outsourcing; Privacy; Cloud computing; k-Nearest neighbors; Query; ALGORITHM; NETWORK; SEARCH; SERVICES;
D O I
10.1016/j.cose.2016.11.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed recently. Nevertheless, existing schemes either suppose each query user is fully-trusted, or need data owner to be online for each query. A fully-trusted query user is assumed to obtain the decryption key of data owner's outsourced dataset, thus, cloud, server could entirely break the outsourced dataset upon gaining the decryption key from some untrustworthy query user. Because of the online requirement, data owner still needs to burden too many computational tasks during the k-NN queries, which thus is impractical. In this paper, we propose a new scheme to perform k-NN query over encrypted data in cloud while protecting the privacy of both data owner and query users from cloud. Our new method just reveals limited information about data owner's key to query users, and has no need of an online data owner. For gaining the properties, we present a new scalar product protocol, then the new protocol and some other transformation approaches are merged into our secure k-NN query system. Additionally, we confirm our security and efficiency through theoretical analysis and extensive simulation experiments. (C) 2016 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:84 / 96
页数:13
相关论文
共 50 条
  • [1] Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner
    Zhu, Youwen
    Wang, Zhikuan
    Zhang, Yue
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2016, PT II, 2016, 9652 : 401 - 414
  • [2] Secure and controllable k-NN query over encrypted cloud data with key confidentiality
    Zhu, Youwen
    Huang, Zhiqiu
    Takagi, Tsuyoshi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016, 89 : 1 - 12
  • [3] A k-NN Query Method Over Encrypted Data
    Zhang, Zhiqiang
    Xin, Lijie
    Xie, Xiaoqin
    Pan, Haiwei
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 164 - 171
  • [4] Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
    Cheng, Ke
    Wang, Liangmin
    Shen, Yulong
    Wang, Hua
    Wang, Yongzhi
    Jiang, Xiaohong
    Zhong, Hong
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 689 - 702
  • [5] PRIVACY-PRESERVING K-NN COMPUTATION OVER ENCRYPTED CLOUD DATA WITHOUT KEY SHARING
    Wang, ShaoHui
    Liu, Tian
    Xiao, Fu
    Wang, Ruchuan
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 398 - 403
  • [6] Query Processing Using Privacy Preserving k-NN Classification Over Encrypted Data
    Vani, E.
    Veena, S.
    Aravindar, D. John
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [7] Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users
    Shankar, K.
    Ilayaraja, M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [8] Secure k-NN query on encrypted cloud database without key-sharing
    Zhu, Youwen
    Xu, Rui
    Takagi, Tsuyoshi
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 201 - 217
  • [9] DOAS: Efficient data owner authorized search over encrypted cloud data
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Zhiquan Liu
    Junwei Zhang
    Fushan Wei
    Peer-to-Peer Networking and Applications, 2018, 11 : 349 - 360
  • [10] DOAS: Efficient data owner authorized search over encrypted cloud data
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Zhang, Junwei
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 349 - 360