Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data

被引:0
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [2 ]
Zhang, Songnian [1 ]
Shao, Jun [3 ]
Zhu, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[3] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
基金
中国博士后科学基金;
关键词
Euclidean distance; KPA-security; matrix encryption; kNN query; outsourced data; CLOUD;
D O I
10.1109/TDSC.2024.3376084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most popular queries in Big Data era, the k nearest neighbors (kNN) query plays a significant role in various applications, such as medical diagnosis, signal processing, and recommendation systems. Meanwhile, driven by the advancement of the cloud service, an emerging trend among applications is to outsource the dataset and the corresponding k NN query services to the cloud. However, as the cloud is not fully trusted, those applications will face vital privacy concerns, and thus they usually encrypt data before outsourcing them to the cloud. Because encrypted data are outsourced to cloud, the k NN query over encrypted data has become increasingly attractive, and many solutions have been put forth in recent years. However, existing solutions cannot fully satisfy the objects of returning exact query results, protecting database privacy and query privacy, achieving high query efficiency, and imposing low computational costs at the user side. To address these issues, in this paper, we propose a new practical and privacy-preserving k NN query scheme. Specifically, we first refine the general security requirements for the matrix encryption by systematically analyzing existing algorithms. Then, we design a novel asymmetric matrix encryption (AME) to securely achieve Euclidean distance computation and two distances comparison in a single-party and non-interactive way. Then, based on the AME scheme, we propose a privacy-preserving k NN query scheme, in which a max-heap of size k is used to accelerate query efficiency. Detailed security analysis shows that our proposed scheme is really privacy-preserving. In addition, extensive performance evaluations are conducted, and the results demonstrate that our proposed scheme is also highly efficient.
引用
收藏
页码:5479 / 5492
页数:14
相关论文
共 50 条
  • [21] Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1090 - 1103
  • [22] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [23] Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4285 - 4299
  • [24] Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data
    Song, Yu
    Yu, Jia
    Ge, Xinrui
    Hao, Rong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38262 - 38272
  • [25] Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data
    Liang, Yanrong
    Ma, Jianfeng
    Miao, Yinbin
    Su, Yuan
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9085 - 9099
  • [26] A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
    Zhang, Jing
    Li, Chuanwen
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14146 - 14171
  • [27] A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
    Fu, Shaojing
    Zhang, Qi
    Jia, Nan
    Xu, Ming
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1574 - 1585
  • [28] Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
    Wang, Xiangyu
    Ma, Jianfeng
    Liu, Ximeng
    Deng, Robert H.
    Miao, Yinbin
    Zhu, Dan
    Ma, Zhuoran
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 2253 - 2262
  • [29] Achieving Privacy-Preserving Weighted Similarity Range Query over Outsourced eHealthcare Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1251 - 1256
  • [30] A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
    Jing Zhang
    Chuanwen Li
    The Journal of Supercomputing, 2023, 79 : 14146 - 14171