Skip to main content

Privacy Preserving kNN Spatial Query with Voronoi Neighbors

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Abstract

With the increased demand for outsourcing databases, there is a demand to enable secure and efficient communications. The concern regarding outsourcing data is mainly providing confidentiality and integrity to the data. This paper proposes a novel solution to answering kNN queries at the cloud server over encrypted data. Data owners transform their data from a native domain to a new domain to assist in nearest neighbors’ classification. The transformation is achieved by Voronoi diagram, which transforms the data space into numerous small regions, simplifying the nearest neighbor search. However, because the regions that make up a Voronoi diagram are irregularly shaped, the search through the network becomes hard to accomplish.

Thus, the solution includes a Grid-based indexing approach for the Voronoi diagram to expedite the kNN search. Additionally, a strong encryption algorithm, like AES, is used to encrypt the data objects being sent from the data owner to the cloud. An authorized user sends encrypted kNN queries to the cloud where the query is processed over encrypted data. The cloud service provider utilizes the proposed indexing scheme to identify a superset of the nearest neighboring objects to be sent back to the user. The user possessing a copy of the encryption key decrypts the superset of k nearest neighbors and filters the exact k objects.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Advances in Spatial and Temporal Data Bases. Springer, pp. 239–257 (2007)

    Google Scholar 

  2. Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: A query integrity assurance scheme for accessing outsourced spatial databases. Geoinformatica 17(1), 97–124 (2013)

    Article  Google Scholar 

  3. Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)

    Article  Google Scholar 

  4. Kim, H.-I., Hong, S.-T., Chang, J.-W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data. In: 2014 International Conference on Big Data and Smart Computing (BIGCOMP), pp. 77–82. IEEE (2014)

    Google Scholar 

  5. Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, 2002, pp. 29–38 (2002). IEEE

    Google Scholar 

  6. Damiani, E., Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 93–102. ACM (2003)

    Google Scholar 

  7. Hossain, A.A., Lee, S.-J., Huh, E.-N.: Shear-based spatial transformation to protect proximity attack in outsourced database. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1633–1638. IEEE (2013)

    Google Scholar 

  8. Real spatial datasets. http://www.cs.fsu.edu/lifeifei/SpatialDataset.htm

  9. Talha, A.M., Kamel, I., Aghbari, Z.A.: Secure kNN queries over outsourced spatial data for location-based services. In: 2016 12th International Conference on Innovations in Information Technology (IIT), Al-Ain, pp. 1–4 (2016)

    Google Scholar 

  10. Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)

    Article  Google Scholar 

  11. Kolahdouzan, M., Shahabi, C.: Voronoi-based k nearest neighbor search for spatial network databases. In: Proceedings of VLDB, vol. 30, pp. 840–851 (2004). https://doi.org/10.1016/b978-012088469-8.50074-7

    Chapter  Google Scholar 

  12. Arora, D., Kumar, U.: Implications of privacy preserving k-means clustering over outsourced data on cloud platform. J. Theor. Appl. Inf. Technol. 96(12) (2018)

    Google Scholar 

  13. Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. (TODS) 34(4) (2009). Article24

    Article  Google Scholar 

  14. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS 2009), Providence, RI, USA, pp. 139–152, July 2009

    Google Scholar 

  15. Zhu, Y., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013, China, pp. 55–60, May 2013

    Google Scholar 

  16. Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)

    Article  Google Scholar 

  17. Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2011)

    Article  Google Scholar 

  18. Hong, J., Wen, T., Guo, Q., Ye, Z.: Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud. Math. Probl. Eng. 2017, 1–15 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eva Habeeb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Habeeb, E., Kamel, I., Al Aghbari, Z. (2019). Privacy Preserving kNN Spatial Query with Voronoi Neighbors. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_85

Download citation

Publish with us

Policies and ethics