Secure kNN query of outsourced spatial data using two-cloud architecture

被引:2
作者
Ghunaim, Tasneem [1 ]
Kamel, Ibrahim [1 ]
Al Aghbari, Zaher [2 ]
机构
[1] Univ Sharjah, Dept Comp Engn, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
关键词
Access pattern; Grid index; Paillier encryption; Two-cloud architecture; Voronoi diagram; PRIVACY; COMPUTATION;
D O I
10.1007/s11227-023-05495-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud service providers can offer virtual servers, with powerful processors and massive storage capacity for nominal per-use charges. With the underlying resources, the cloud allows data owners to trade capital expense for the variable cost. The auto-scaling features of the cloud can control the consumption of computing resources and hence the associated cost. However, by saving data on the cloud, the privacy of data becomes at risk. Data becomes exposed to the untrusted cloud. The users' queries can also be monitored by attackers and cloud operators. Furthermore, the pattern of accessing data can be identified. The solution is to encrypt data before outsourcing to the cloud. However, answering queries over encrypted data becomes a challenge. This paper proposes a novel technique, called Secure Voronoi kNN (SVK), that answers k-nearest neighbor (kNN) queries over encrypted data in a two-cloud architecture. SVK can hide data access patterns from the cloud.
引用
收藏
页码:21310 / 21345
页数:36
相关论文
共 39 条
  • [1] Biryukov A., 2011, Encyclopedia of Cryptography and Security, P205, DOI DOI 10.1007/978-1-4419-5906-5-556
  • [2] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [3] Security and Privacy-Enhancing Multicloud Architectures
    Bohli, Jens-Matthias
    Gruschka, Nils
    Jensen, Meiko
    Lo Iacono, Luigi
    Marnau, Ninja
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 212 - 224
  • [4] Robust Empirical Bayesian Reconstruction of Distributed Sources for Electromagnetic Brain Imaging
    Cai, Chang
    Diwakar, Mithun
    Chen, Dan
    Sekihara, Kensuke
    Nagarajan, Srikantan S.
    [J]. IEEE TRANSACTIONS ON MEDICAL IMAGING, 2020, 39 (03) : 567 - 577
  • [5] CBSNewYork, 2020, DAT BREACH
  • [6] Secure computation without computers
    D'Arco, Paolo
    De Prisco, Roberto
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 651 : 11 - 36
  • [7] Data61 C, 2018, PYTH PAILL DOC
  • [8] Delfs H., 2015, Introduction to Cryptography, V3, DOI [10.1007/978-3-662-47974-2, DOI 10.1007/978-3-662-47974-2]
  • [9] Gaikwad VS., 2022, PRIVACY PRESERVING O
  • [10] Goethals B, 2004, LECT NOTES COMPUT SC, V3506, P104