Secure k-NN Query With Multiple Keys Based on Random Projection Forests

被引:1
作者
Zhang, Yunzhen [1 ]
Wang, Baocang [2 ]
Zhao, Zhen [3 ,4 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[4] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Access pattern privacy; data privacy; k-nearest neighbors (k-NN) query; multiple keys; privacy-preserving; EFFICIENT;
D O I
10.1109/JIOT.2023.3347429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a basic primitive in spatial and multimedia databases, the k-nearest neighbors (k-NN) query has been widely used in electronic medicine, location-based services, and so on. With the boom in cloud computing, it is currently a trend to upload massive data to the cloud server to enjoy its powerful storage and computing resources. Recently, research communities and commercial applications have proposed many schemes to support k-NN query on cloud data. However, most of the existing k-NN query schemes were designed under the assumption that the query users (QUs) are fully trusted and hold the key of the data owner. In this case, even if the queries were encrypted, the QUs can capture the query content from each other, leading to the query privacy leakage. Unfortunately, to the best of our knowledge, few k-NN query schemes can ensure data privacy under the key-confidentiality condition. In this article, we propose a secure k-NN query with multiple keys based on random projection forests (SMkNN), in which each QU's partial strong private key can only decrypt the encrypted query results belonging to its own, but not the encrypted database, the encrypted query data and query results of other QUs. Moreover, our proposal not only answers the query efficiently but also ensures the privacy of data, query, results, and access pattern, and the verification of the correctness of the results. Finally, the complexity and security are theoretically analyzed, and the practicality and efficiency of our proposed scheme are compared by simulation experiments. Index Terms-Access pattern
引用
收藏
页码:15205 / 15218
页数:14
相关论文
共 39 条
[1]  
Barker E., 2016, NIST SPECIAL PUBLICA, DOI DOI 10.6028/NIST.SP.800-57P1R2007
[2]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[3]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[4]   Secure k-NN Query on Encrypted Cloud Data with Multiple Keys [J].
Cheng, Ke ;
Wang, Liangmin ;
Shen, Yulong ;
Wang, Hua ;
Wang, Yongzhi ;
Jiang, Xiaohong ;
Zhong, Hong .
IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) :689-702
[5]   Secure Nearest Neighbor Query on Crowd-Sensing Data [J].
Cheng, Ke ;
Wang, Liangmin ;
Zhong, Hong .
SENSORS, 2016, 16 (10)
[6]  
Cheng X., 2020, arXiv
[7]   Multi-identity and Multi-key Leveled FHE from Learning with Errors [J].
Clear, Michael ;
McGoldrick, Ciaran .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :630-656
[8]   Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database [J].
Cui, Ningning ;
Qian, Kang ;
Cai, Taotao ;
Li, Jianxin ;
Yang, Xiaochun ;
Cui, Jie ;
Zhong, Hong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) :9333-9349
[9]   Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments [J].
Cui, Ningning ;
Yang, Xiaochun ;
Chen, Yunliang ;
Li, Jianxin ;
Wang, Bin ;
Min, Geyong .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :9503-9514
[10]   SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform [J].
Cui, Ningning ;
Yang, Xiaochun ;
Wang, Bin ;
Li, Jianxin ;
Wang, Guoren .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :253-264