A secure kNN query processing algorithm using homomorphic encryption on outsourced database

被引:26
作者
Kim, Hyeong-Il [1 ]
Kim, Hyeong-Jin [2 ]
Chang, Jae-Woo [2 ]
机构
[1] Agcy Def Dev, Missile Syst PMO 1, Daejeon, South Korea
[2] Chonbuk Natl Univ, Dept Comp Engn, Jeonju, South Korea
基金
新加坡国家研究基金会;
关键词
Database outsourcing; Database encryption; Encrypted index structure; Data privacy; kNN query processing;
D O I
10.1016/j.datak.2017.07.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the adoption of cloud computing, database outsourcing has emerged as a new platform. Due to the serious privacy concerns associated with cloud computing, databases must be encrypted before being outsourced to the cloud. Therefore, various k-nearest neighbor (kNN) query processing techniques have been proposed for encrypted databases. However, existing schemes are either insecure or inefficient. In this paper, we propose a new secure kNN query processing algorithm. Our algorithm guarantees the confidentiality of both encrypted data and users' query records. To achieve a high level of query processing efficiency, we also devise an encrypted index search scheme that performs data filtering without revealing data access patterns. A performance analysis shows that the proposed scheme outperforms the existing scheme in terms of query processing costs while preserving data privacy.
引用
收藏
页数:20
相关论文
共 33 条
[1]   Privacy-preserving trajectory stream publishing [J].
Al-Hussaeni, Khalil ;
Fung, Benjamin C. M. ;
Cheung, William K. .
DATA & KNOWLEDGE ENGINEERING, 2014, 94 :89-109
[2]  
[Anonymous], 2012, P 7 INT C RISKS SEC
[3]  
Bayardo RJ, 2005, PROC INT CONF DATA, P217
[4]  
Bugiel S, 2011, LECT NOTES COMPUT SC, V7025, P32, DOI 10.1007/978-3-642-24712-5_3
[5]  
Cao Y, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY, PROCEEDINGS, P39
[6]   Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud [J].
Cheng, Xiang ;
Su, Sen ;
Teng, Yiping ;
Xiao, Ke .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) :3205-3218
[7]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
[8]  
Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
[9]  
Elmehdwi Y, 2014, PROC INT CONF DATA, P664, DOI 10.1109/ICDE.2014.6816690
[10]  
Goldreich O., 2004, GERERAL CRYPTOGRAPHI, V2