Secure k-NN query on encrypted cloud database without key-sharing
نویسندگان
چکیده
In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbours (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users know the entire key which is used to encrypt and decrypt data owner’s outsourced database. It is constitutionally not feasible in lots of real-world applications. In this paper, we propose a novel secure and practical scheme for preserving data privacy and supporting k-NN query on encrypted cloud data. In the new approach, only limited information about the key of data owner is disclosed to query users, and the data privacy can be protected even when query users leak their knowledge about the key to adversary. Theoretical analysis and experiment results confirm the security and practicality of our scheme.
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملSecret Sharing , Proof of Plaintext Knowledge , and Their Applications to Secure Cloud Storage
In this talk, I will present some recent results in the two areas of cryptography: cheater-identifiable secret sharing and (postquantum) code-based cryptographic protocols, putting them into the context of providing security and privacy for cloud storage services. First, I will present secret sharing as a tool for simultaneously achieving security and availability for cloud storage. Here, a pri...
متن کاملk-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...
متن کاملData Mining Over Encrypted Data on Cloud
Data Mining has wide applications in many areas such as medicine, scientific, banking, research and among government agencies. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Classification is one of the commonly used tasks in data mining applications Howeve...
متن کاملSecurity Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJESDF
دوره 5 شماره
صفحات -
تاریخ انتشار 2013