Skip to main content

Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9652))

Abstract

Recently, many schemes have been proposed to support k-nearest neighbors (k-NN) query on encrypted cloud data. However, existing approaches either assume query users are fully-trusted, or require data owner to be online all the time. Query users in fully-trusted assumption can access the key to encrypt/decrypt outsourced data, thus, untrusted cloud server can completely break the data upon obtaining the key from any untrustworthy query user. The online requirement introduces much cost to data owner. This paper presents a new scheme to support k-NN query on encrypted cloud database while preserving the privacy of database and query points. Our proposed approach only discloses limited information about the key to query users, and does not require an online data owner. Theoretical analysis and extensive experiments confirm the security and efficiency of our scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)

    Article  Google Scholar 

  2. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.J.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th IEEE ICDCS, pp. 253–262 (2010)

    Google Scholar 

  3. Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.J.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 31st IEEE ICDCS, pp. 393–402 (2011)

    Google Scholar 

  4. Li, M., Yu, S.C., Cao, N., Lou, W.J.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st IEEE ICDCS, pp. 383–392 (2011)

    Google Scholar 

  5. Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Proceedings of DBSEC, pp. 89–103 (2006)

    Google Scholar 

  6. Shi, E., Bethencourt, J., Chan, T.H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy, pp. 350–364 (2007)

    Google Scholar 

  7. Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving queries on encrypted data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479–495. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Yiu, M.L., Assent, I., Jensen, C.S., Kalnis, P.: Outsourced similarity search on metric data assets. IEEE Trans. Knowl. Data Eng. 24(2), 338–352 (2012)

    Article  Google Scholar 

  9. Wong, W.J., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 35th SIGMOD, pp. 139–152 (2009)

    Google Scholar 

  10. Hu, H.B., Xu, J.L., Ren, C.S., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th IEEE ICDE, pp. 601–612 (2011)

    Google Scholar 

  11. Xu, H.Q., Guo, S.M., Chen, K.K.: Building confidential and efficient query services in the cloud with rasp data perturbation. IEEE Trans. Knowl. Data Eng. 26(2), 322 (2014)

    Article  Google Scholar 

  12. Yao, B., Li, F.F., Xiao, X.K.: Secure nearest neighbor revisited. In: Proceedings of the 29th IEEE ICDE, pp. 733–744 (2013)

    Google Scholar 

  13. Zhu, Y.W., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing key with query users. In: ACM Workshop on Security in Cloud Computing, pp. 55–60 (2013)

    Google Scholar 

  14. Zhu, Y.W., Xu, R., Takagi, T.: Secure k-NN query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3/4), 201–217 (2013)

    Article  Google Scholar 

  15. Liu, K., Giannella, C.M., Kargupta, H.: An attacker’s view of distance preserving maps for privacy preserving data mining. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 297–308. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Zhu, Y.W., Huang, Z.Q., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1 (2016). doi:10.1016/j.jpdc.2015.11.004

    Article  Google Scholar 

  17. Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceedings of IEEE 30th International Conference on Data Engineering, pp. 664–675 (2014)

    Google Scholar 

Download references

Acknowledgments

This work is partly supported by the Fundamental Research Funds for the Central Universities (NZ2015108), Natural Science Foundation of Jiangsu province (BK20150760), the China Postdoctoral Science Foundation funded project (2015M571752), Jiangsu province postdoctoral research funds (1402033C), and NSFC (61472470, 61370224).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youwen Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhu, Y., Wang, Z., Zhang, Y. (2016). Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. In: Bailey, J., Khan, L., Washio, T., Dobbie, G., Huang, J., Wang, R. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2016. Lecture Notes in Computer Science(), vol 9652. Springer, Cham. https://doi.org/10.1007/978-3-319-31750-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31750-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31749-6

  • Online ISBN: 978-3-319-31750-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics