Efficient and secure k-nearest neighbor query on outsourced data

被引:0
|
作者
Huijuan Lian
Weidong Qiu
Di Yan
Zheng Huang
Peng Tang
机构
[1] Shanghai Jiao Tong University,School of Cyber Security
[2] Shanghai Jiao Tong University,Department of Computer Science and Engineering
关键词
-nearest neighbor; Privacy-preserving; Data outsourcing; Location-based service;
D O I
暂无
中图分类号
学科分类号
摘要
k-nearest neighbor (k-NN) query is widely applied to various networks, such as mobile Internet, peer-to-peer (P2P) network, urban road networks, and so on. The location-based service in the outsourced environment has become a research hotspot with the rise of cloud computing. Meanwhile, various privacy issues have been increasingly prominent. We propose an efficient privacy-preserving query protocol to accomplish the k-nearest neighbor (k-NN) query processing on outsourced data. We adopt the Moore curve to transform the spatial data into one-dimensional sequence and utilize the AES to encrypt the original data. According to the cryptographic transformation, the proposed protocol can minimize the communication overhead to achieve efficient k-NN query while protecting the spatial data and location privacy. Furthermore, the proposed efficient scheme offers considerable performance with privacy preservation. Experiments show that the proposed scheme achieves high accuracy and efficiency while preserving the data and location privacy when compared with the existing related approach.
引用
收藏
页码:2324 / 2333
页数:9
相关论文
共 50 条
  • [41] Approximate k-Nearest Neighbor Query of High Dimensional Data Based on Dimension Grouping and Reducing
    Li S.
    Hu Y.
    Hao X.
    Zhang L.
    Hao Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (03): : 609 - 623
  • [42] Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database
    Wu, Wei
    Liu, Jian
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE ACCESS, 2018, 6 : 41771 - 41784
  • [43] Secure Nearest Neighbor Query on Crowd-Sensing Data
    Cheng, Ke
    Wang, Liangmin
    Zhong, Hong
    SENSORS, 2016, 16 (10)
  • [44] A Secure k-nearest Neighbor Query Processing Method Based on Extended Range of Cipher-Text Search
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Jiang, Yi-Long
    Yang, Jun
    International Journal of Network Security, 2022, 24 (05): : 913 - 921
  • [45] Dynamic data structures for k-nearest neighbor queries
    de Berg, Sarita
    Staals, Frank
    COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS, 2023, 111
  • [46] Efficient continuous K-nearest neighbor query processing over moving objects with uncertain speed and direction
    Huang, Yuan-Ko
    Liao, Shi-Jei
    Lee, Chiang
    SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS, 2008, 5069 : 549 - 557
  • [47] OQ-Quad: An Efficient Query Processing for Continuous K-Nearest Neighbor Based on Quad Tree
    Zou, Yong-Gui
    Fan, Qing-Lin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 197 - 202
  • [48] Location Privacy and Query Privacy Preserving Method for K-nearest Neighbor Query in Road Networks
    Zhou C.-L.
    Chen Y.-H.
    Tian H.
    Cai S.-B.
    Zhou, Chang-Li (zhouchangli666@163.com), 1600, Chinese Academy of Sciences (31): : 471 - 492
  • [49] Efficient k-nearest neighbor search on moving object trajectories
    Gueting, Ralf Hartmut
    Behr, Thomas
    Xu, Jianqiu
    VLDB JOURNAL, 2010, 19 (05): : 687 - 714
  • [50] Efficient Privacy-Preserving k-Nearest Neighbor Search
    Qi, Yinian
    Atallah, Mikhail J.
    28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 311 - 319