کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
432286 688849 2016 12 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Secure and controllable kk-NN query over encrypted cloud data with key confidentiality
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Secure and controllable kk-NN query over encrypted cloud data with key confidentiality
چکیده انگلیسی


• We present a new scheme for encrypting the outsourced database and query points.
• The new scheme can effectively support kk-nearest neighbor computation while preserving data privacy and query privacy.
• The new scheme enables data owner to keep his key in private, instead of sharing the key with query users.
• In the new scheme, query users cannot launch any feasible kk-nearest neighbor query without approval of data owner.
• Experimental results validate the efficiency of the new approach.

To enjoy the advantages of cloud service while preserving security and privacy, huge data are increasingly outsourced to cloud in encrypted form. Unfortunately, most conventional encryption schemes cannot smoothly support encrypted data analysis and processing. As a significant topic, several schemes have been recently proposed to securely compute kk-nearest neighbors (kk-NN) on encrypted data being outsourced to cloud server (CS). However, most existing kk-NN search methods assume query users (QUs) are fully-trusted and know the key of data owner (DO) to encrypt/decrypt outsourced database. It is not realistic in many situations.In this paper, we propose a new secure kk-NN query scheme on encrypted cloud data. Our approach simultaneously achieves: (1) data privacy against CS: the encrypted database can resist potential attacks of CS, (2) key confidentiality against QUs: to avoid the problems caused by key-sharing, QUs cannot learn DO’s key, (3) query privacy against CS and DO: the privacy of query points is preserved as well, (4) query controllability  : QUs cannot launch a feasible kk-NN query for any new point without approval of DO. We provide theoretical guarantees for security and privacy properties, and show the efficiency of our scheme through extensive experiments.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Parallel and Distributed Computing - Volume 89, March 2016, Pages 1–12
نویسندگان
, , ,