Abstract
Recently, many schemes have been proposed to support k-nearest neighbors (k-NN) query on encrypted cloud data. However, existing approaches either assume query users are fully-trusted, or require data owner to be online all the time. Query users in fully-trusted assumption can access the key to encrypt/decrypt outsourced data, thus, untrusted cloud server can completely break the data upon obtaining the key from any untrustworthy query user. The online requirement introduces much cost to data owner. This paper presents a new scheme to support k-NN query on encrypted cloud database while preserving the privacy of database and query points. Our proposed approach only discloses limited information about the key to query users, and does not require an online data owner. Theoretical analysis and extensive experiments confirm the security and efficiency of our scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.J.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th IEEE ICDCS, pp. 253–262 (2010)
Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.J.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 31st IEEE ICDCS, pp. 393–402 (2011)
Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st IEEE ICDCS, pp. 383–392 (2011)
Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Proceedings of DBSEC, pp. 89–103 (2006)
Shi, E., Bethencourt, J., Chan, T.H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy, pp. 350–364 (2007)
Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving queries on encrypted data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479–495. Springer, Heidelberg (2006)
Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. Knowl. Data Eng. 24(2), 338–352 (2012)
Wong, W.J., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 35th SIGMOD, pp. 139–152 (2009)
Hu, H.B., Xu, J.L., Ren, C.S., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th IEEE ICDE, pp. 601–612 (2011)
Xu, H.Q., Guo, S.M., Chen, K.K.: Building confidential and efficient query services in the cloud with rasp data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322 (2014)
Yao, B., Li, F.F., Xiao, X.K.: Secure nearest neighbor revisited. In: Proceedings of the 29th IEEE ICDE, pp. 733–744 (2013)
Zhu, Y.W., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: ACM Workshop on Security in Cloud Computing, pp. 55–60 (2013)
Zhu, Y.W., Xu, R., Takagi, T.: Secure k-NN query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3/4), 201–217 (2013)
Liu, K., Giannella, C.M., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297–308. Springer, Heidelberg (2006)
Zhu, Y.W., Huang, Z.Q., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1 (2016). doi:10.1016/j.jpdc.2015.11.004
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceedings of IEEE 30th International Conference on Data Engineering, pp. 664–675 (2014)
Acknowledgments
This work is partly supported by the Fundamental Research Funds for the Central Universities (NZ2015108), Natural Science Foundation of Jiangsu province (BK20150760), the China Postdoctoral Science Foundation funded project (2015M571752), Jiangsu province postdoctoral research funds (1402033C), and NSFC (61472470, 61370224).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhu, Y., Wang, Z., Zhang, Y. (2016). Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. In: Bailey, J., Khan, L., Washio, T., Dobbie, G., Huang, J., Wang, R. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2016. Lecture Notes in Computer Science(), vol 9652. Springer, Cham. https://doi.org/10.1007/978-3-319-31750-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-31750-2_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31749-6
Online ISBN: 978-3-319-31750-2
eBook Packages: Computer ScienceComputer Science (R0)