Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud

被引:21
|
作者
Zhu, Youwen [1 ,2 ]
Zhang, Yue [1 ,3 ]
Li, Xingxin [1 ,4 ]
Yan, Hongyang [5 ]
Li, Jing [6 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Nanjing Univ, Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 210023, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, MIIT Key Lab Safety Crit Software, Nanjing 210016, Jiangsu, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[5] Nankai Univ, Coll Comp & Control Engn, Tianjin 300350, Peoples R China
[6] Guangzhou Univ, Sch Comp & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
来源
关键词
cloud computing; collusion attack; privacy; secure nearest neighbor query; security problems; MERKLE-TREE; SEARCH;
D O I
10.1002/cpe.4681
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Securely performing nearest neighbor query over encrypted data in cloud is an important topic in the area of cloud computing, for which Wang et al recently put forward a scheme (ie, CloudBI-II) to address the challenging security problem: resisting the collusion of cloud server and query users. In this paper, we propose an efficient attack method that indicates CloudBI-II will reveal the difference vectors under the collusion attack. Furthermore, we show that the difference vector disclosure will result in serious privacy breach and, thus, attain an efficient attack method to break CloudBI-II. Namely, CloudBI-II cannot achieve their declared security. Through theoretical analysis and experiment evaluation, we confirm that our proposed attack approach can fast recover the original data from the encrypted data set in CloudBI-II. Finally, we provide an enhanced scheme that can efficiently resist the collusion attack.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited
    Zhu, Youwen
    Wang, Zhikuan
    Wang, Jian
    [J]. 2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [2] Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data
    Li, Rui
    Liu, Alex X.
    Xu, Huanle
    Liu, Ying
    Yuan, Huaqiang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 91 - 106
  • [3] Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
    Zhu, Youwen
    Takagi, Tsuyoshi
    Hu, Rong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 326 - 330
  • [4] Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem
    Guo, Cheng
    Zhuang, Ruhan
    Su, Chunhua
    Liu, Charles Zhechao
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9868 - 9879
  • [5] Efficient and Secure Nearest Neighbor Search Over Encrypted Data in Cloud Environment
    Upinder, Kaur
    Pushpa, R. Suri
    [J]. DATA SCIENCE AND ANALYTICS, 2018, 799 : 587 - 598
  • [6] Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments
    Elmehdwi, Yousef
    Samanthula, Bharath K.
    Jiang, Wei
    [J]. 2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2014, : 664 - 675
  • [7] Secure Approximate Nearest Neighbor Search over Encrypted Data
    Gao, Yaqian
    Miao, Meixia
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 578 - 583
  • [8] Efficient Collusion-Resisting Secure Sum Protocol
    Zhu Youwen
    Huang Liusheng
    Yang Wei
    Yuan Xing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) : 407 - 413
  • [9] Efficient and Secure k-Nearest Neighbor Search over Encrypted Data in Public Cloud
    Song, Fuyuan
    Qin, Zheng
    Liu, Qin
    Liang, Jinwen
    Ou, Lu
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
    Xingxin Li
    Youwen Zhu
    Rui Xu
    Jian Wang
    Yushu Zhang
    [J]. Frontiers of Computer Science, 2024, 18