BopSkyline: Boosting privacy-preserving skyline query service in the cloud

被引:0
作者
Wang, Weibo [1 ]
Zheng, Yifeng [1 ]
Wang, Songlei [1 ]
Hua, Zhongyun [1 ]
Xu, Lei [2 ]
Gao, Yansong [3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Guangdong, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing, Peoples R China
[3] CSIRO, Data61, Sydney, Australia
基金
中国国家自然科学基金;
关键词
Service outsourcing; Cloud computing; Skyline query; Privacy protection; EFFICIENT;
D O I
10.1016/j.cose.2024.103803
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread adoption of cloud computing, there has been great popularity of storing and querying databases in the cloud. However, such service outsourcing also entails critical data privacy concerns, as the cloud providers are generally not in the same trust domain as the data owners/users and could even suffer from data breaches. In this paper, different from most existing works that propose security designs for keyword search, we focus on secure realizations of advanced skyline query processing, which plays an important role in multicriteria decision support applications. We propose BopSkyline, a new system framework for privacy -preserving skyline query service in cloud computing. BopSkyline is designed to not only ensure the confidentiality of outsourced databases, skyline queries, and query results, but also conceal data patterns (like the dominance relationships among database tuples) and search access patterns that may indirectly lead to data leakages. Notably, through a delicate synergy of key ideas on secure database shuffling and differentially private database padding, BopSkyline achieves a significant performance boost over the state-of-the-art. Extensive experiments demonstrate that compared with the state-of-the-art prior work, BopSkyline is up to 4 .7x better in query latency and achieves up to 99 .38% cost savings in communication.
引用
收藏
页数:12
相关论文
共 44 条
[1]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[2]  
Balke WT, 2004, LECT NOTES COMPUT SC, V2992, P256
[3]  
BleepingComputer, Flexbooker discloses data breach, over 3.7 million accounts impacted
[4]   The Skyline operator [J].
Börzsönyi, S ;
Kossmann, D ;
Stocker, K .
17TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2001, :421-430
[5]  
Bothe S., 2014, P INT WORKSH PRIV SE
[6]   Metal: A Metadata-Hiding File-Sharing System [J].
Chen, Weikeng ;
Popa, Raluca Ada .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[7]   SPDZ2k : Efficient MPC mod 2k for Dishonest Majority [J].
Cramer, Ronald ;
Damgard, Ivan ;
Escudero, Daniel ;
Scholl, Peter ;
Xing, Chaoping .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :769-798
[8]   SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform [J].
Cui, Ningning ;
Yang, Xiaochun ;
Wang, Bin ;
Li, Jianxin ;
Wang, Guoren .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :253-264
[9]  
Dellis E., 2006, P ACM CIKM
[10]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,