Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data

被引:0
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [2 ]
Zhang, Songnian [1 ]
Shao, Jun [3 ]
Zhu, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
基金
中国博士后科学基金;
关键词
Euclidean distance; KPA-security; matrix encryption; kNN query; outsourced data; CLOUD;
D O I
10.1109/TDSC.2024.3376084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most popular queries in Big Data era, the k nearest neighbors (kNN) query plays a significant role in various applications, such as medical diagnosis, signal processing, and recommendation systems. Meanwhile, driven by the advancement of the cloud service, an emerging trend among applications is to outsource the dataset and the corresponding k NN query services to the cloud. However, as the cloud is not fully trusted, those applications will face vital privacy concerns, and thus they usually encrypt data before outsourcing them to the cloud. Because encrypted data are outsourced to cloud, the k NN query over encrypted data has become increasingly attractive, and many solutions have been put forth in recent years. However, existing solutions cannot fully satisfy the objects of returning exact query results, protecting database privacy and query privacy, achieving high query efficiency, and imposing low computational costs at the user side. To address these issues, in this paper, we propose a new practical and privacy-preserving k NN query scheme. Specifically, we first refine the general security requirements for the matrix encryption by systematically analyzing existing algorithms. Then, we design a novel asymmetric matrix encryption (AME) to securely achieve Euclidean distance computation and two distances comparison in a single-party and non-interactive way. Then, based on the AME scheme, we propose a privacy-preserving k NN query scheme, in which a max-heap of size k is used to accelerate query efficiency. Detailed security analysis shows that our proposed scheme is really privacy-preserving. In addition, extensive performance evaluations are conducted, and the results demonstrate that our proposed scheme is also highly efficient.
引用
收藏
页码:5479 / 5492
页数:14
相关论文
共 50 条
  • [41] Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
    Ye, Chong-Qiang
    Li, Jian
    Chen, Xiao-Yu
    SENSORS, 2024, 24 (22)
  • [42] VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
    Wan, Zhiguo
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) : 1083 - 1095
  • [43] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [44] Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    Yang, Ming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 893 - 904
  • [45] Achieving Efficient and Privacy-Preserving Reverse Skyline Query Over Single Cloud
    Peng, Yubo
    Li, Xiong
    Gu, Ke
    Chen, Jinjun
    Das, Sajal K.
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 37 (01) : 29 - 44
  • [46] Privacy-Preserving kNN Spatial Query Using Voronoi Diagram
    Habeeb, Eva
    Kamel, Abdullah Al Amodi Ibrahim
    Al Aghbari, Zaher
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2021), 2022, 417 : 109 - 117
  • [47] Achieving Efficient and Privacy-Preserving (α, β)-Core Query Over Bipartite Graphs in Cloud
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Zhang, Songnian
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1979 - 1993
  • [48] Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving
    Xu, Lei
    Xu, Chungen
    Liu, Zhongyi
    Wang, Yunling
    Wang, Jianfeng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (02): : 675 - 690
  • [49] Improvement on a privacy-preserving outsourced classification protocol over encrypted data
    Chai, Yanting
    Zhan, Yu
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    WIRELESS NETWORKS, 2020, 26 (06) : 4363 - 4374
  • [50] Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
    Liang, Kaitai
    Huang, Xinyi
    Guo, Fuchun
    Liu, Joseph K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2365 - 2376