SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform

被引:57
作者
Cui, Ningning [1 ]
Yang, Xiaochun [1 ]
Wang, Bin [1 ]
Li, Jianxin [2 ]
Wang, Guoren [3 ]
机构
[1] Northeastern Univ, Boston, MA 02115 USA
[2] Deakin Univ, Geelong, Vic, Australia
[3] Beijing Inst Technol, Beijing, Peoples R China
来源
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020) | 2020年
基金
中国国家自然科学基金;
关键词
LOCATION; AUTHENTICATION;
D O I
10.1109/ICDE48307.2020.00029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the boom in cloud computing, data outsourcing in location-based services is proliferating and has attracted increasing interest from research communities and commercial applications. Nevertheless, since the cloud server is probably both untrusted and malicious, concerns of data security and result integrity have become on the rise sharply. However, there exist little work that can commendably assure the data security and result integrity using a unified way. In this paper, we study the problem of secure and verifiable k nearest neighbor query (SVkNN). To support SVkNN, we first propose a novel unified structure, called verifiable and secure index (VSI). Based on this, we devise a series of secure protocols to facilitate query processing and develop a compact verification strategy. Given an SVkNN query, our proposed solution can not merely answer the query efficiently while can guarantee: 1) preserving the privacy of data, query, result and access patterns; 2) authenticating the correctness and completeness of the results without leaking the confidentiality. Finally, the formal security analysis and complexity analysis are theoretically proven and the performance and feasibility of our proposed approaches are empirically evaluated and demonstrated.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 27 条
[1]  
[Anonymous], 2012, Ndss
[2]   Authenticating Top-k Queries in Location-based Services with Confidentiality [J].
Chen, Qian ;
Hu, Haibo ;
Xu, Jianliang .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 7 (01) :49-60
[3]   Secure kNN Query Processing in Untrusted Cloud Environments [J].
Choi, Sunoh ;
Ghinita, Gabriel ;
Lim, Hyo-Sang ;
Bertino, Elisa .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) :2818-2831
[4]  
Elmehdwi Y, 2014, PROC INT CONF DATA, P664, DOI 10.1109/ICDE.2014.6816690
[5]  
Ghinita G, 2008, PROC ACM SIGMOD INT, P121, DOI [DOI 10.1145/1376616.1376631, 10.1145/1376616.1376631]
[6]  
Guo XJ, 2016, IEEE RAD CONF, P1000
[7]  
KIM HI, 2017, DATA KNOWLEDGE ENG
[8]   SecEQP: A Secure and Efficient Scheme for SkNN Query Problem over Encrypted Geodata on Cloud [J].
Lei, Xinyu ;
Liu, Alex X. ;
Li, Rui ;
Tu, Guan-Hua .
2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, :662-673
[9]  
Lin X., 2011, CIKM, P1583
[10]  
Liu A, 2015, PROC INT CONF DATA, P66, DOI 10.1109/ICDE.2015.7113273