Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed recently. Nevertheless, existing schemes either suppose each query user is fully-trusted, or need data owner to be online for each query. A fully-trusted query user is assumed to obtain the decryption key of data owner's outsourced dataset, thus, cloud server could entirely break the outsourced dataset upon gaining the decryption key from some untrustworthy query user. Because of the online requirement, data owner still needs to burden too many computational tasks during the k-NN queries, which thus is impractical. In this paper, we propose a new scheme to perform k-NN query over encrypted data in cloud while protecting the privacy of both data owner and query users from cloud. Our new method just reveals limited information about data owner's key to query users, and has no need of an online data owner. For gaining the properties, we present a new scalar product protocol, then the new protocol and some other transformation approaches are merged into our secure k-NN query system. Additionally, we confirm our security and efficiency through theoretical analysis and extensive simulation experiments.
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
Castiglione A.
2017-01-01
Abstract
Several schemes for k-nearest neighbors (k-NN) query over encrypted data in cloud have been proposed recently. Nevertheless, existing schemes either suppose each query user is fully-trusted, or need data owner to be online for each query. A fully-trusted query user is assumed to obtain the decryption key of data owner's outsourced dataset, thus, cloud server could entirely break the outsourced dataset upon gaining the decryption key from some untrustworthy query user. Because of the online requirement, data owner still needs to burden too many computational tasks during the k-NN queries, which thus is impractical. In this paper, we propose a new scheme to perform k-NN query over encrypted data in cloud while protecting the privacy of both data owner and query users from cloud. Our new method just reveals limited information about data owner's key to query users, and has no need of an online data owner. For gaining the properties, we present a new scalar product protocol, then the new protocol and some other transformation approaches are merged into our secure k-NN query system. Additionally, we confirm our security and efficiency through theoretical analysis and extensive simulation experiments.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.