Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

被引:6
作者
Cheng, Xiang [1 ]
Su, Sen [1 ]
Teng, Yiping [1 ]
Xiao, Ke [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
k-nearest neighbors; data privacy; cloud computing; SEARCH SERVICES;
D O I
10.1002/sec.1245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With rapid advances in wireless communication, mobile devices and positioning technologies, location-based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS providers may outsource their data services to the cloud. However, to protect data privacy, sensitive data have to be encrypted before outsourcing, which may impede the functionality and performance of the data services. In this paper, to make one step closer towards practical deployment of LBS in the cloud, we study the problem of secure and efficient k-nearest neighbor (kNN) query processing over encrypted spatial data. Although there exist a number of studies on kNN query processing over encrypted data, few of them can provide security and efficiency simultaneously. To this end, we present a secure and efficient kNN query (SEkQ) scheme. In this scheme, a new encryption method, namely, asymmetric scalar-product-preserving encryption with Laplace noise (ASPELN) is proposed, which can resist both the chosen-plaintext and known-plaintext attacks. Based on ASPELN, an encrypted hierarchical index called SR-tree (short for Secure R-tree) is devised to facilitate efficient kNN query processing on encrypted spatial data. To search with the SR-tree index, two effective methods, namely, anchor-assisted position determination and position-distinguished trapdoor generation are proposed for the distance computations between the query point and SR-tree nodes under encryption. Thorough analysis shows the validity and security of the proposed scheme. Extensive experimental results on real datasets further demonstrate the proposed scheme can achieve high efficiency and good scalability. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3205 / 3218
页数:14
相关论文
共 23 条
  • [1] [Anonymous], IEEE T KNOWLEDGE DAT
  • [2] [Anonymous], PROC INT CONF DATA
  • [3] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [4] Buchmann J A., 2002, Introduction to Cryptography
  • [5] Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
  • [6] Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
    Cao, Ning
    Yang, Zhenyu
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 393 - 402
  • [7] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    [J]. JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [8] Chuah M., 2011, Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P273, DOI 10.1109/ICDCSW.2011.11
  • [9] Curtmola Reza, 2006, 13 ACM C COMP COMM S, P79, DOI DOI 10.1145/1180405.1180417
  • [10] Elmehdwi Y, 2014, PROC INT CONF DATA, P664, DOI 10.1109/ICDE.2014.6816690