Abstract
With the increased demand for outsourcing databases, there is a demand to enable secure and efficient communications. The concern regarding outsourcing data is mainly providing confidentiality and integrity to the data. This paper proposes a novel solution to answering kNN queries at the cloud server over encrypted data. Data owners transform their data from a native domain to a new domain to assist in nearest neighbors’ classification. The transformation is achieved by Voronoi diagram, which transforms the data space into numerous small regions, simplifying the nearest neighbor search. However, because the regions that make up a Voronoi diagram are irregularly shaped, the search through the network becomes hard to accomplish.
Thus, the solution includes a Grid-based indexing approach for the Voronoi diagram to expedite the kNN search. Additionally, a strong encryption algorithm, like AES, is used to encrypt the data objects being sent from the data owner to the cloud. An authorized user sends encrypted kNN queries to the cloud where the query is processed over encrypted data. The cloud service provider utilizes the proposed indexing scheme to identify a superset of the nearest neighboring objects to be sent back to the user. The user possessing a copy of the encryption key decrypts the superset of k nearest neighbors and filters the exact k objects.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Advances in Spatial and Temporal Data Bases. Springer, pp. 239–257 (2007)
Ku, W.-S., Hu, L., Shahabi, C., Wang, H.: A query integrity assurance scheme for accessing outsourced spatial databases. Geoinformatica 17(1), 97–124 (2013)
Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling search services on outsourced private spatial data. VLDB J. 19(3), 363–384 (2010)
Kim, H.-I., Hong, S.-T., Chang, J.-W.: Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data. In: 2014 International Conference on Big Data and Smart Computing (BIGCOMP), pp. 77–82. IEEE (2014)
Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, 2002, pp. 29–38 (2002). IEEE
Damiani, E., Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 93–102. ACM (2003)
Hossain, A.A., Lee, S.-J., Huh, E.-N.: Shear-based spatial transformation to protect proximity attack in outsourced database. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1633–1638. IEEE (2013)
Real spatial datasets. http://www.cs.fsu.edu/lifeifei/SpatialDataset.htm
Talha, A.M., Kamel, I., Aghbari, Z.A.: Secure kNN queries over outsourced spatial data for location-based services. In: 2016 12th International Conference on Innovations in Information Technology (IIT), Al-Ain, pp. 1–4 (2016)
Hu, L., Ku, W., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Trans. Knowl. Data Eng. 25(4), 863–876 (2013)
Kolahdouzan, M., Shahabi, C.: Voronoi-based k nearest neighbor search for spatial network databases. In: Proceedings of VLDB, vol. 30, pp. 840–851 (2004). https://doi.org/10.1016/b978-012088469-8.50074-7
Arora, D., Kumar, U.: Implications of privacy preserving k-means clustering over outsourced data on cloud platform. J. Theor. Appl. Inf. Technol. 96(12) (2018)
Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. (TODS) 34(4) (2009). Article24
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS 2009), Providence, RI, USA, pp. 139–152, July 2009
Zhu, Y., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013, China, pp. 55–60, May 2013
Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016)
Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2011)
Hong, J., Wen, T., Guo, Q., Ye, Z.: Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud. Math. Probl. Eng. 2017, 1–15 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Habeeb, E., Kamel, I., Al Aghbari, Z. (2019). Privacy Preserving kNN Spatial Query with Voronoi Neighbors. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_85
Download citation
DOI: https://doi.org/10.1007/978-3-030-16184-2_85
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16183-5
Online ISBN: 978-3-030-16184-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)