PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud

被引:2
|
作者
Zheng, Yandong [1 ]
Zhu, Hui [1 ]
Lu, Rongxing [2 ]
Guan, Yunguo [2 ]
Zhang, Songnian [2 ]
Wang, Fengwei [1 ]
Shao, Jun [3 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
基金
中国博士后科学基金; 加拿大自然科学与工程研究理事会;
关键词
Cryptography; Servers; Data privacy; Homomorphic encryption; Cloud computing; Outsourcing; Computational efficiency; high-dimensional data; pivot filter condition; privacy-preserving; reverse kNN query; SEARCH;
D O I
10.1109/TDSC.2023.3291715
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Big data and bursting cloud computing technologies have facilitated an increasing trend of outsourcing data-driven services to the cloud, where the reverse kNN (RkNN) query is a popularly outsourced query service. The RkNN query aims to retrieve objects having the query object as kNN and widely applied in the product recommendation. Considering privacy concerns, the outsourced query services are demanded to protect data privacy, and consequently a series of privacy-preserving query solutions have been put forth. Nevertheless, RkNN query over high-dimensional data has not been studied to date. In this work, we design the first efficient and privacy-preserving RkNN query scheme over encrypted high-dimensional data, named PHRkNN. Specifically, we first introduce a pivot filter condition for the RkNN query and utilize it to deliberately design a pivot filter R-tree (PFR-tree) to organize the high-dimensional dataset such that the RkNN query has sublinear query efficiency. Then, we propose our PHRkNN scheme by designing some homomorphic encryption based private algorithms and applying them to privately achieve PFR-tree based RkNN query. After that, we propose an oblivious PHRkNN scheme on the basis of the PHRkNN scheme by designing a private random tree permutation (PRTP) algorithm to protect the access pattern privacy. The security of our PHRkNN scheme and oblivious PHRkNN scheme is proved by the simulation-based security analysis. The performance is verified through computational costs and communication overheads evaluation.
引用
收藏
页码:1831 / 1844
页数:14
相关论文
共 50 条
  • [1] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [2] SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    Zheng, Yandong
    Lu, Rongxing
    Zhu, Hui
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 888 - 903
  • [3] Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud
    Sun, Lili
    Zhang, Yonggang
    Zheng, Yandong
    Song, Weiyu
    Lu, Rongxing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3766 - 3781
  • [4] Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4285 - 4299
  • [5] Achieving Efficient and Privacy-Preserving Reverse Skyline Query Over Single Cloud
    Peng, Yubo
    Li, Xiong
    Gu, Ke
    Chen, Jinjun
    Das, Sajal K.
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 37 (01) : 29 - 44
  • [6] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [7] Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data
    Song, Yu
    Yu, Jia
    Ge, Xinrui
    Hao, Rong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38262 - 38272
  • [8] Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2620 - 2631
  • [9] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [10] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5479 - 5492