Skip to main content
Log in

Efficient and secure k-nearest neighbor query on outsourced data

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

k-nearest neighbor (k-NN) query is widely applied to various networks, such as mobile Internet, peer-to-peer (P2P) network, urban road networks, and so on. The location-based service in the outsourced environment has become a research hotspot with the rise of cloud computing. Meanwhile, various privacy issues have been increasingly prominent. We propose an efficient privacy-preserving query protocol to accomplish the k-nearest neighbor (k-NN) query processing on outsourced data. We adopt the Moore curve to transform the spatial data into one-dimensional sequence and utilize the AES to encrypt the original data. According to the cryptographic transformation, the proposed protocol can minimize the communication overhead to achieve efficient k-NN query while protecting the spatial data and location privacy. Furthermore, the proposed efficient scheme offers considerable performance with privacy preservation. Experiments show that the proposed scheme achieves high accuracy and efficiency while preserving the data and location privacy when compared with the existing related approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: attacks, countermeasures, and opportunities. IEEE Commun Mag 57(11):116–122

    Article  Google Scholar 

  2. Li H, Liu D, Dai Y, Luan TH, Yu S (2015) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Top Comput 6(1):97–109

    Article  Google Scholar 

  3. Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169-178

  4. Van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24-43. Springer

  5. Smart NP, Vercauteren F (2010) Fully homomorphic encryption with relatively small key and ciphertext sizes. In: International Workshop on Public Key Cryptography, pp. 420-443. Springer

  6. Gentry C, Halevi S (2011) Implementing gentry’s fully-homomorphic encryption scheme. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 129-148. Springer

  7. Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Transac Comput Theor (TOCT) 6(3):1–36

    Article  MathSciNet  Google Scholar 

  8. Halevi S, Shoup V (2014) Algorithms in helib. In: Annual Cryptology Conference, pp. 554-571. Springer

  9. Halevi S, Shoup V (2018) Faster homomorphic linear transformations in HElib. In: Annual International Cryptology Conference, pp. 93-120. Springer

  10. Lawder JK, King PJH (2001) Querying multi-dimensional data indexed using the Hilbert space-filling curve. ACM SIGMOD Rec 30(1):19–24

    Article  Google Scholar 

  11. Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: International Symposium on Spatial and Temporal Databases, pp. 239-257. Springer

  12. Ku W-S, Hu L, Shahabi C, Wang H (2013) A query integrity assurance scheme for accessing outsourced spatial databases. Geoinformatica 17(1):97–124

    Article  Google Scholar 

  13. Tian F, Gui X, Yang P, Zhang X, Yang J (2013) Security analysis for hilbert curve based spatial data privacy-preserving method. In: 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp. 929-934. IEEE

  14. Wang P, Ravishankar CV (2013) Secure and efficient range queries on outsourced databases using Rp-trees. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 314-325. IEEE

  15. Kim H-I, Hong S, Chang J-W (2016) Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng 104:32–44

    Article  Google Scholar 

  16. Paulet R, Kaosar MG, Yi X, Bertino E (2013) Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng 26(5):1200–1210

    Article  Google Scholar 

  17. Shao J, Lu R, Lin X (2014) FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 244-252. IEEE

  18. Yi X, Paulet R, Bertino E, Varadharajan V (2016) Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans Knowl Data Eng 28(6):1546–1559

    Article  Google Scholar 

  19. Sweeney L (2002) k-anonymity: A model for protecting privacy. Int J Uncert, Fuzz Knowl-Based Syst 10(05):557–570

    Article  MathSciNet  Google Scholar 

  20. Mokbel MF, Chow C-Y, Aref WG (2006) The new casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases, pp. 763–774

  21. Lee H, Oh B-S, Kim, H-I, Chang J (2012) Grid-based cloaking area creation scheme supporting continuous location-based services. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 537–543

  22. Kim H-I, Chang J-W (2012) A grid-based cloaking scheme for continuous location-based services in distributed systems. In: Computer Science and its Applications. pp. 69–78. Springer

  23. Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 366-375. IEEE

  24. Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2011) Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. GeoInformatica 15(4):699–726

    Article  Google Scholar 

  25. Um J-H, Kim H-D, Chang J-W (2010) An advanced cloaking algorithm using Hilbert curves for anonymous location based service. In: 2010 IEEE second international conference on social computing, pp. 1093-1098. IEEE

  26. Ni W-W, Zheng J-W, Chong Z-H (2012) HilAnchor: location privacy protection in the presence of users’ preferences. J Comput Sci Technol 27(2):413–427

    Article  Google Scholar 

  27. Liu K, Kargupta H, Ryan J (2005) Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans Knowl Data Eng 18(1):92–106

    Google Scholar 

  28. Yiu ML, Ghinita G, Jensen CS, Kalnis P (2010) Enabling search services on outsourced private spatial data. VLDB J 19(3):363–384

    Article  Google Scholar 

  29. Hossain AA, Lee S-J, Huh E-N (2013) Shear-based spatial transformation to protect proximity attack in outsourced database. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1633-1638. IEEE

  30. Wong WK, Cheung DW-L, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152

  31. Narayanan A, Thiagarajan N, Lakhani M, Hamburg M, Boneh D (2011) Location privacy via private proximity testing. In: NDSS

  32. Yiu ML, Assent I, Jensen CS, Kalnis P (2010) Outsourced similarity search on metric data assets. IEEE Trans Knowl Data Eng 24(2):338–352

    Article  Google Scholar 

  33. Puttaswamy KP, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY (2012) Preserving location privacy in geosocial applications. IEEE Trans Mob Comput 13(1):159–173

    Article  Google Scholar 

  34. Lien I-T, Lin Y-H, Shieh J-R, Wu J-L (2013) A novel privacy preserving location-based service protocol with secret circular shift for k-nn search. IEEE Transac Inform Forensics Sec 8(6):863–873

    Article  Google Scholar 

  35. Utsunomiya Y, Toyoda K, Sasase I (2016) LPCQP: lightweight private circular query protocol with divided POI-table and somewhat homomorphic encryption for privacy-preserving k-NN search. J Inform Process 24(1):109–122

    Article  Google Scholar 

  36. Sagan H (2012) Space-filling curves. Springer Science & Business Media

  37. Moon B, Jagadish HV, Faloutsos C, Saltz JH (2001) Analysis of the clustering properties of the Hilbert space-filling curve. IEEE Trans Knowl Data Eng 13(1):124–141

    Article  Google Scholar 

  38. Jagadish HV (1990) Linear clustering of objects with multiple attributes. In: Proceedings of the 1990 ACM SIGMOD international conference on Management of data, pp. 332–342

  39. Xu G, Li H, Dai Y, Yang K, Lin X (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Transac Inform Forensics Sec 14(4):870–885

    Article  Google Scholar 

  40. Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 32(6):144–151

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Key Research and Development Program of China under Grant 2017YFB0802704, 2017YFB0802202, and the National Natural Science Foundation of China under Grand 61972249.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weidong Qiu.

Additional information

This article is part of the Topical Collection: Special Issue on Security and Privacy in Machine Learning Assisted P2P Networks

Guest Editors: Hongwei Li, Rongxing Lu and Mohamed Mahmoud

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lian, H., Qiu, W., Yan, D. et al. Efficient and secure k-nearest neighbor query on outsourced data. Peer-to-Peer Netw. Appl. 13, 2324–2333 (2020). https://doi.org/10.1007/s12083-020-00909-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00909-2

Keywords

Navigation