Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service

被引:4
作者
Lian, Huijuan [1 ]
Qiu, Weidong [1 ]
Yan, Di [2 ]
Huang, Zheng [1 ]
Guo, Jie [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
关键词
ANONYMITY; PROTECTION;
D O I
10.1155/2017/1490283
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
With the development of mobile communication technology, location-based services (LBS) are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor (k-NN) search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol (EPCQP) with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest (POIs) information with the Brakerski-Gentry-Vaikuntanathan homomorphic encryption scheme for privacy-preserving. The proposed scheme performs the secret circular shift of the encrypted POIs information to hide the location of the user without a trusted third party. To reduce the computation and communication cost, we dynamically divide the table of the POIs information according to the value of k. Experiments show that the proposed scheme provides high accuracy query results while maintaining low computation and communication cost.
引用
收藏
页数:14
相关论文
共 47 条
[11]  
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[12]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[13]   Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection [J].
Ghinita, Gabriel ;
Kalnis, Panos ;
Kantarcioglu, Murat ;
Bertino, Elisa .
GEOINFORMATICA, 2011, 15 (04) :699-726
[14]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[15]  
Halevi S., 2013, DESIGN IMPLEMENTATIO, P12
[16]  
Hilbert D., 1891, Math. Annal., V38, P459, DOI [10.1007/BF01199431, DOI 10.1007/BF01199431]
[17]  
Hossain A., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P358, DOI 10.1109/TrustCom.2012.193
[18]  
Hossain A.-A, 2011, Proceedings of the 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE 2011). 11th International Symposium on Pervasive Systems, Algorithms, Networks (I-SPAN 2011). 10th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2011), P81, DOI 10.1109/CSE.2011.28
[19]  
Hu Haibo., 2012, P ACM SIGMOD INT C M, P301
[20]  
JAGADISH HV, 1990, SIGMOD REC, V19, P332, DOI 10.1145/93605.98742