Secure kNN query of outsourced spatial data using two-cloud architecture

被引:2
|
作者
Ghunaim, Tasneem [1 ]
Kamel, Ibrahim [1 ]
Al Aghbari, Zaher [2 ]
机构
[1] Univ Sharjah, Dept Comp Engn, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 18期
关键词
Access pattern; Grid index; Paillier encryption; Two-cloud architecture; Voronoi diagram; PRIVACY; COMPUTATION;
D O I
10.1007/s11227-023-05495-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud service providers can offer virtual servers, with powerful processors and massive storage capacity for nominal per-use charges. With the underlying resources, the cloud allows data owners to trade capital expense for the variable cost. The auto-scaling features of the cloud can control the consumption of computing resources and hence the associated cost. However, by saving data on the cloud, the privacy of data becomes at risk. Data becomes exposed to the untrusted cloud. The users' queries can also be monitored by attackers and cloud operators. Furthermore, the pattern of accessing data can be identified. The solution is to encrypt data before outsourcing to the cloud. However, answering queries over encrypted data becomes a challenge. This paper proposes a novel technique, called Secure Voronoi kNN (SVK), that answers k-nearest neighbor (kNN) queries over encrypted data in a two-cloud architecture. SVK can hide data access patterns from the cloud.
引用
收藏
页码:21310 / 21345
页数:36
相关论文
共 50 条
  • [21] Efficient and secure k-nearest neighbor query on outsourced data
    Lian, Huijuan
    Qiu, Weidong
    Yan, Di
    Huang, Zheng
    Tang, Peng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2324 - 2333
  • [22] Efficient and secure k-nearest neighbor query on outsourced data
    Huijuan Lian
    Weidong Qiu
    Di Yan
    Zheng Huang
    Peng Tang
    Peer-to-Peer Networking and Applications, 2020, 13 : 2324 - 2333
  • [23] Facilitating Secure and Efficient Spatial Query Processing on the Cloud
    Talha, Ayesha
    Kamel, Ibrahim
    Al Aghbari, Zaher
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (04) : 988 - 1001
  • [24] Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture
    Wu, Haiqin
    Dudder, Boris
    Wang, Liangmin
    Cao, Zhenfu
    Zhou, Jun
    Feng, Xia
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [25] Improved Outsourced Provable Data Possession for Secure Cloud Storage
    Yang, Haibin
    Yi, Zhengge
    Li, Ruifeng
    Tu, Zheng
    Wang, Xu An
    Cui, Yuanyou
    Yang, Xiaoyuan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [27] Multi-keyword privacy query for outsourced data in cloud environments
    Jia, Qianqian
    Shi, Run-Hua
    Wang, Qingle
    Li, Huijie
    SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2024, 54 (03)
  • [28] Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation
    Purushothama, B. R.
    Amberker, B. B.
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 88 - 95
  • [29] Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data
    Song, Yu
    Yu, Jia
    Ge, Xinrui
    Hao, Rong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38262 - 38272
  • [30] Secure Ranked Query Processing in Location Based Services Accessing Outsourced Spatial Databases
    Falke, Priyanka W.
    Mahalle, Vshwanath S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 531 - 536