A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases

被引:0
|
作者
Hyeong-Jin Kim
Jae-Woo Chang
机构
[1] Chonbuk National University,Department of Computer Engineering
关键词
Database outsourcing; Database encryption; Secure Top-k query processing; Encrypted index; Hiding data access patterns;
D O I
暂无
中图分类号
学科分类号
摘要
With the growth of cloud computing, database outsourcing has attracted a lot of interest. Due to the serious privacy threats in cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, various Top-k query processing algorithms have been studied for encrypted databases. However, existing algorithms are either insecure or inefficient. Therefore, in this paper we propose a new Top-k query processing algorithm that guarantees confidentiality of both data and user queries while hiding data access patterns. Our algorithm also allows the query issuer to not participate in the query processing. To achieve a high query processing efficiency, we implement new secure protocols using Yao’s garbled circuit and a data packing technique. A performance analysis shows that the proposed algorithm outperforms the existing work in terms of query processing costs.
引用
收藏
页码:898 / 904
页数:6
相关论文
共 50 条
  • [1] A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (05) : 898 - 904
  • [2] Top-k query processing in uncertain Databases
    Soliman, Mohamed A.
    Ilyas, Ihab F.
    Chang, Kevin Chen-Chuan
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 871 - +
  • [3] Efficient processing of top-k queries in uncertain databases
    Yi, Ke
    Li, Feifei
    Kollios, George
    Srivastava, Divesh
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1406 - +
  • [4] Multi-user Preferences Based Top-k Query Processing Algorithm
    Wu, Yunlong
    Liu, Guohua
    Liu, Yuanyuan
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 69 - 73
  • [5] Answering Top-k Queries over Outsourced Sensitive Data in the Cloud
    Mahboubi, Sakina
    Akbarinia, Reza
    Valduriez, Patrick
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2018, PT I, 2018, 11029 : 218 - 231
  • [6] TKEP: An efficient top-k query processing algorithm on massive data
    Han X.-X.
    Yang D.-H.
    Li J.-Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (08): : 1405 - 1417
  • [7] Probabilistic top-k range query processing for uncertain databases
    Xiao, Guoqing
    Wu, Fan
    Zhou, Xu
    Li, Keqin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (02) : 1109 - 1120
  • [8] Progressive Top-k Subarray Query Processing in Array Databases
    Choi, Dalsu
    Park, Chang-Sup
    Chung, Yon Dohn
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2019, 12 (09): : 989 - 1001
  • [9] Secure Spatial Top-k Query Processing via Untrusted Location Based Services Accessing Outsourced Databases
    Falke, Priyanka W.
    Mahalle, V. S.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [10] Top-k typicality queries and efficient query answering methods on large databases
    Ming Hua
    Jian Pei
    Ada W. C. Fu
    Xuemin Lin
    Ho-Fung Leung
    The VLDB Journal, 2009, 18 : 809 - 835