Efficient and secure k-nearest neighbor query on outsourced data

被引:0
|
作者
Huijuan Lian
Weidong Qiu
Di Yan
Zheng Huang
Peng Tang
机构
[1] Shanghai Jiao Tong University,School of Cyber Security
[2] Shanghai Jiao Tong University,Department of Computer Science and Engineering
关键词
-nearest neighbor; Privacy-preserving; Data outsourcing; Location-based service;
D O I
暂无
中图分类号
学科分类号
摘要
k-nearest neighbor (k-NN) query is widely applied to various networks, such as mobile Internet, peer-to-peer (P2P) network, urban road networks, and so on. The location-based service in the outsourced environment has become a research hotspot with the rise of cloud computing. Meanwhile, various privacy issues have been increasingly prominent. We propose an efficient privacy-preserving query protocol to accomplish the k-nearest neighbor (k-NN) query processing on outsourced data. We adopt the Moore curve to transform the spatial data into one-dimensional sequence and utilize the AES to encrypt the original data. According to the cryptographic transformation, the proposed protocol can minimize the communication overhead to achieve efficient k-NN query while protecting the spatial data and location privacy. Furthermore, the proposed efficient scheme offers considerable performance with privacy preservation. Experiments show that the proposed scheme achieves high accuracy and efficiency while preserving the data and location privacy when compared with the existing related approach.
引用
收藏
页码:2324 / 2333
页数:9
相关论文
共 50 条
  • [21] Comparative Analysis of K-Nearest Neighbor and Modified K-Nearest Neighbor Algorithm for Data Classification
    Okfalisa
    Mustakim
    Gazalba, Ikbal
    Reza, Nurul Gayatri Indah
    2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 294 - 298
  • [22] A model for k-nearest neighbor query processing cost in multidimensional data space
    Lee, JH
    Cha, GH
    Chung, CW
    INFORMATION PROCESSING LETTERS, 1999, 69 (02) : 69 - 76
  • [23] Efficient outsourcing of secure k-nearest neighbour query over encrypted database
    Xu, Rui
    Morozou, Kirill
    Yang, Yanjiang
    Zhou, Jianying
    Takagi, Tsuyoshi
    COMPUTERS & SECURITY, 2017, 69 : 65 - 83
  • [24] A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud
    Peng, Yanguo
    Cui, Jiangtao
    Li, Hui
    Ma, Jianfeng
    INFORMATION SCIENCES, 2017, 387 : 146 - 164
  • [25] Efficient reverse k-nearest neighbor estimation
    Achtert, Elke
    Boehm, Christian
    Kroeger, Peer
    Kunath, Peter
    Pryakhin, Alexey
    Renz, Matthias
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2007, 21 (3-4): : 179 - 195
  • [26] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database
    Xu, Rui
    Morozov, Kirill
    Yang, Yanjiang
    Zhou, Jianying
    Takagi, Tsuyoshi
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 181 - 197
  • [27] k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
    Samanthula, Bharath K.
    Elmehdwi, Yousef
    Jiang, Wei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (05) : 1261 - 1273
  • [28] Efficient k-Nearest Neighbor Searching in Nonordered Discrete Data Spaces
    Kolbe, Dashiell
    Zhu, Qiang
    Pramanik, Sakti
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2010, 28 (02)
  • [29] k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks
    Hyeong-Il Kim
    Jae-Woo Chang
    Journal of Computer Science & Technology, 2013, 28 (04) : 585 - 596
  • [30] k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks
    Hyeong-Il Kim
    Jae-Woo Chang
    Journal of Computer Science and Technology, 2013, 28 : 585 - 596