Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed recently. Nevertheless, existing schemes either suppose each query user is fully-trusted, or need data owner to be online for each query. A fully-trusted query user is assumed to obtain the decryption key of data owner's outsourced dataset, thus, cloud server could entirely break the outsourced dataset upon gaining the decryption key from some untrustworthy query user. Because of the online requirement, data owner still needs to burden too many computational tasks during the k-NN queries, which thus is impractical. In this paper, we propose a new scheme to perform k-NN query over encrypted data in cloud while protecting the privacy of both data owner and query users from cloud. Our new method just reveals limited information about data owner's key to query users, and has no need of an online data owner. For gaining the properties, we present a new scalar product protocol, then the new protocol and some other transformation approaches are merged into our secure k-NN query system. Additionally, we confirm our security and efficiency through theoretical analysis and extensive simulation experiments.

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner

Castiglione A.
2017-01-01

Abstract

Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed recently. Nevertheless, existing schemes either suppose each query user is fully-trusted, or need data owner to be online for each query. A fully-trusted query user is assumed to obtain the decryption key of data owner's outsourced dataset, thus, cloud server could entirely break the outsourced dataset upon gaining the decryption key from some untrustworthy query user. Because of the online requirement, data owner still needs to burden too many computational tasks during the k-NN queries, which thus is impractical. In this paper, we propose a new scheme to perform k-NN query over encrypted data in cloud while protecting the privacy of both data owner and query users from cloud. Our new method just reveals limited information about data owner's key to query users, and has no need of an online data owner. For gaining the properties, we present a new scalar product protocol, then the new protocol and some other transformation approaches are merged into our secure k-NN query system. Additionally, we confirm our security and efficiency through theoretical analysis and extensive simulation experiments.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4810917
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 38
  • ???jsp.display-item.citation.isi??? 32
social impact