Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing

被引:5
|
作者
Kim, Hyeong-Jin [1 ]
Lee, Hyunjo [1 ]
Kim, Yong-Ki [2 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Room 7401,7th Engn Bldg, Jeonju Si 54896, Jeollabuk Do, South Korea
[2] Vis Coll Jeonju, Dept IT Convergence Syst, 235 Chun Jam Ro, Jeonju Si 55069, Jeollabuk Do, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2022年 / 78卷 / 07期
基金
新加坡国家研究基金会;
关键词
Secure protocol; Privacy-preserving kNN query processing algorithm; Encrypted database; Database outsourcing; Cloud computing; DIMENSIONALITY REDUCTION TECHNIQUES; PLAINTEXT; SERVICES;
D O I
10.1007/s11227-021-04286-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, a couple of privacy-preserving kNN query processing algorithms have been proposed over the encrypted database. However, the existing algorithms are either insecure or inefficient. Therefore, in this paper we propose a privacy-preserving kNN query processing algorithm via secure two-party computation on the encrypted database. Our algorithm preserves both data privacy and query privacy while hiding data access patterns. For this, we propose efficient and secure protocols based on Yao's garbled circuit. To achieve a high degree of efficiency in query processing, we also propose a parallel kNN query processing algorithm using encrypted random value pool. Through our performance analysis, we verify that our proposed algorithms outperform the existing ones in terms of a query processing cost.
引用
收藏
页码:9245 / 9284
页数:40
相关论文
共 50 条
  • [21] Privacy-Preserving Two-Party Bartering Secure Against Active Adversaries
    Wueller, Stefan
    Pessin, Wadim
    Meyer, Ulrike
    Wetzel, Susanne
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [22] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418
  • [23] Privacy-Preserving Contact Query Processing Over Trajectory Data in Mobile Cloud Computing
    Lu, Qu
    Dai, Hua
    Li, Pengyue
    Wan, Shuyan
    Yang, Geng
    Xiang, Yang
    Xiao, Fu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1818 - 1832
  • [24] Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
    Du, Minxin
    Wang, Qian
    He, Meiqi
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2320 - 2332
  • [25] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [26] Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data
    Yang, Yutao
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 392 - 402
  • [27] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [28] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [29] A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations
    Foerg, Fabian
    Mayer, Daniel
    Wetzel, Susanne
    Wueller, Stefan
    Meyer, Ulrike
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 57 - 66
  • [30] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218