Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data

被引:0
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [2 ]
Zhang, Songnian [1 ]
Shao, Jun [3 ]
Zhu, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
基金
中国博士后科学基金;
关键词
Euclidean distance; KPA-security; matrix encryption; kNN query; outsourced data; CLOUD;
D O I
10.1109/TDSC.2024.3376084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most popular queries in Big Data era, the k nearest neighbors (kNN) query plays a significant role in various applications, such as medical diagnosis, signal processing, and recommendation systems. Meanwhile, driven by the advancement of the cloud service, an emerging trend among applications is to outsource the dataset and the corresponding k NN query services to the cloud. However, as the cloud is not fully trusted, those applications will face vital privacy concerns, and thus they usually encrypt data before outsourcing them to the cloud. Because encrypted data are outsourced to cloud, the k NN query over encrypted data has become increasingly attractive, and many solutions have been put forth in recent years. However, existing solutions cannot fully satisfy the objects of returning exact query results, protecting database privacy and query privacy, achieving high query efficiency, and imposing low computational costs at the user side. To address these issues, in this paper, we propose a new practical and privacy-preserving k NN query scheme. Specifically, we first refine the general security requirements for the matrix encryption by systematically analyzing existing algorithms. Then, we design a novel asymmetric matrix encryption (AME) to securely achieve Euclidean distance computation and two distances comparison in a single-party and non-interactive way. Then, based on the AME scheme, we propose a privacy-preserving k NN query scheme, in which a max-heap of size k is used to accelerate query efficiency. Detailed security analysis shows that our proposed scheme is really privacy-preserving. In addition, extensive performance evaluations are conducted, and the results demonstrate that our proposed scheme is also highly efficient.
引用
收藏
页码:5479 / 5492
页数:14
相关论文
共 50 条
  • [31] Efficient Privacy-Preserving Geographic Keyword Boolean Range Query Over Encrypted Spatial Data
    Gong, Zhimao
    Li, Junyi
    Lin, Yaping
    Wei, Jianhao
    Lancine, Camara
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 455 - 466
  • [32] A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
    Shaojing Fu
    Qi Zhang
    Nan Jia
    Ming Xu
    Mobile Networks and Applications, 2021, 26 : 1574 - 1585
  • [33] EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
    Li, Lichun
    Lu, Rongxing
    Huang, Cheng
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02): : 206 - 218
  • [34] PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid
    Wen, Mi
    Lu, Rongxing
    Zhang, Kuan
    Lei, Jingsheng
    Liang, Xiaohui
    Shen, Xuemin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (01) : 178 - 191
  • [35] EPPSQ: Achieving efficient and privacy-preserving statistics queries over encrypted data in smart grids
    Li, Beibei
    Zhu, Ziqing
    Zhang, Linghao
    Chang, Zhengwei
    Zhao, Liang
    Kumar, Arun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 149 : 265 - 279
  • [36] Outsourced privacy-preserving classification service over encrypted data
    Li, Tong
    Huang, Zhengan
    Li, Ping
    Liu, Zheli
    Jia, Chunfu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 : 100 - 110
  • [37] Privacy-Preserving Hierarchical Anonymization Framework over Encrypted Data
    Jia, Jing
    Saito, Kenta
    Nishi, Hiroaki
    IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (10) : 1011 - 1019
  • [38] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [39] PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1831 - 1844
  • [40] Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data
    Cheng, Fangquan
    Wang, Qian
    Zhang, Qianwen
    Peng, Zhiyong
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 348 - 359