Efficient and secure k-nearest neighbor query on outsourced data

被引:0
作者
Huijuan Lian
Weidong Qiu
Di Yan
Zheng Huang
Peng Tang
机构
[1] Shanghai Jiao Tong University,School of Cyber Security
[2] Shanghai Jiao Tong University,Department of Computer Science and Engineering
来源
Peer-to-Peer Networking and Applications | 2020年 / 13卷
关键词
-nearest neighbor; Privacy-preserving; Data outsourcing; Location-based service;
D O I
暂无
中图分类号
学科分类号
摘要
k-nearest neighbor (k-NN) query is widely applied to various networks, such as mobile Internet, peer-to-peer (P2P) network, urban road networks, and so on. The location-based service in the outsourced environment has become a research hotspot with the rise of cloud computing. Meanwhile, various privacy issues have been increasingly prominent. We propose an efficient privacy-preserving query protocol to accomplish the k-nearest neighbor (k-NN) query processing on outsourced data. We adopt the Moore curve to transform the spatial data into one-dimensional sequence and utilize the AES to encrypt the original data. According to the cryptographic transformation, the proposed protocol can minimize the communication overhead to achieve efficient k-NN query while protecting the spatial data and location privacy. Furthermore, the proposed efficient scheme offers considerable performance with privacy preservation. Experiments show that the proposed scheme achieves high accuracy and efficiency while preserving the data and location privacy when compared with the existing related approach.
引用
收藏
页码:2324 / 2333
页数:9
相关论文
共 77 条
[1]  
Xu G(2019)Data security issues in deep learning: attacks, countermeasures, and opportunities IEEE Commun Mag 57 116-122
[2]  
Li H(2015)Personalized search over encrypted data with efficient and secure updates in mobile clouds IEEE Trans Emerg Top Comput 6 97-109
[3]  
Ren H(2014)(Leveled) fully homomorphic encryption without bootstrapping ACM Transac Comput Theor (TOCT) 6 1-36
[4]  
Yang K(2001)Querying multi-dimensional data indexed using the Hilbert space-filling curve ACM SIGMOD Rec 30 19-24
[5]  
Deng RH(2013)A query integrity assurance scheme for accessing outsourced spatial databases Geoinformatica 17 97-124
[6]  
Li H(2016)Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data Data Knowl Eng 104 32-44
[7]  
Liu D(2013)Privacy-preserving and content-protecting location based queries IEEE Trans Knowl Data Eng 26 1200-1210
[8]  
Dai Y(2016)Practical approximate k nearest neighbor queries with location and query privacy IEEE Trans Knowl Data Eng 28 1546-1559
[9]  
Luan TH(2002)k-anonymity: A model for protecting privacy Int J Uncert, Fuzz Knowl-Based Syst 10 557-570
[10]  
Yu S(2011)Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection GeoInformatica 15 699-726