Secure kNN query of outsourced spatial data using two-cloud architecture

被引:2
|
作者
Ghunaim, Tasneem [1 ]
Kamel, Ibrahim [1 ]
Al Aghbari, Zaher [2 ]
机构
[1] Univ Sharjah, Dept Comp Engn, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 18期
关键词
Access pattern; Grid index; Paillier encryption; Two-cloud architecture; Voronoi diagram; PRIVACY; COMPUTATION;
D O I
10.1007/s11227-023-05495-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud service providers can offer virtual servers, with powerful processors and massive storage capacity for nominal per-use charges. With the underlying resources, the cloud allows data owners to trade capital expense for the variable cost. The auto-scaling features of the cloud can control the consumption of computing resources and hence the associated cost. However, by saving data on the cloud, the privacy of data becomes at risk. Data becomes exposed to the untrusted cloud. The users' queries can also be monitored by attackers and cloud operators. Furthermore, the pattern of accessing data can be identified. The solution is to encrypt data before outsourcing to the cloud. However, answering queries over encrypted data becomes a challenge. This paper proposes a novel technique, called Secure Voronoi kNN (SVK), that answers k-nearest neighbor (kNN) queries over encrypted data in a two-cloud architecture. SVK can hide data access patterns from the cloud.
引用
收藏
页码:21310 / 21345
页数:36
相关论文
共 50 条
  • [1] Secure kNN query of outsourced spatial data using two-cloud architecture
    Tasneem Ghunaim
    Ibrahim Kamel
    Zaher Al Aghbari
    The Journal of Supercomputing, 2023, 79 : 21310 - 21345
  • [2] Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
    Cheng, Xiang
    Su, Sen
    Teng, Yiping
    Xiao, Ke
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3205 - 3218
  • [3] A secure kNN query processing algorithm using homomorphic encryption on outsourced database
    Kim, Hyeong-Il
    Kim, Hyeong-Jin
    Chang, Jae-Woo
    DATA & KNOWLEDGE ENGINEERING, 2019, 123
  • [4] Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data
    Liu, Lin
    Su, Jinshu
    Liu, Ximeng
    Chen, Rongmao
    Huang, Kai
    Deng, Robert H.
    Wang, Xiaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 9841 - 9852
  • [5] Secure KNN Set Similarity Search in Outsourced Cloud Environments
    Li, Lu
    Jiang, Xufeng
    Gao, Ge
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 474 - 479
  • [6] Secure kNN Queries over Outsourced Spatial Data for Location-based Services
    Talha, Ayesha M.
    Kamel, Ibrahim
    Al Aghbari, Zaher
    PROCEEDINGS OF THE 2016 12TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2016, : 123 - 126
  • [7] Fast and Secure kNN Query Processing in Cloud Computing
    Lei, Xinyu
    Tu, Guan-Hua
    Liu, Alex X.
    Xie, Tian
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [8] Secure kNN Query Processing in Untrusted Cloud Environments
    Choi, Sunoh
    Ghinita, Gabriel
    Lim, Hyo-Sang
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (11) : 2818 - 2831
  • [9] Enabling Secure Outsourced Cloud Data
    Sankareeswari, G.
    Selvi, S.
    Vidhyalakshmi, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [10] Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Wu, Wei
    Xian, Ming
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 236 - 243