Efficient k -NN query over encrypted data in cloud with limited key-disclosure and offline data owner

Computers & Security - Tập 69 - Trang 84-96 - 2017
Lu Zhou1,2, Youwen Zhu2,3, Aniello Castiglione4
1Shandong University, Jinan 250100, China
2College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
3Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 210021, China
4Department of Computer Science, University of Salerno, I-84084 Fisciano, Italy

Tài liệu tham khảo

Amirbekyan, 2007, Privacy-preserving k-nn for small and large data sets, 699 Arya, 1998, An optimal algorithm for approximate nearest neighbor searching fixed dimensions, J ACM, 45, 891, 10.1145/293347.293348 Beyer, 1999, When is nearest neighbor meaningful?, 217 Cao, 2011, Privacy-preserving query over encrypted graph-structured data in cloud computing, 393 Chen, 2005, Privacy preserving data classification with rotation perturbation Chen, 2007, Towards attack-resilient geometric data perturbation Chen, 2011, Rasp: efficient multidimensional range query on attack-resilient encrypted databases, 249 Ciaccia, 2000, Pac nearest neighbor queries: approximate and controlled search in high-dimensional and metric spaces, 244 Elmehdwi, 2013 Fu, 2015, Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing, IEICE Trans Commun, 98, 190, 10.1587/transcom.E98.B.190 García-Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput Secur, 28, 18, 10.1016/j.cose.2008.08.003 Ghinita, 2011, Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection, Geoinformatica, 15, 699, 10.1007/s10707-010-0121-4 Goethals, 2004, On private scalar product computation for privacy-preserving data mining, vol. 3506, 104 Goldreich, 2004, Foundations of cryptography, vol. II Gu, 2014, Known-plaintext attack on secure kNN computation on encrypted databases, Secur Commun Netw Guo, 2012, Privacy preserving boosting in the cloud with secure half-space queries, 1031 Hashem, 2010, Privacy preserving group nearest neighbor queries, 489 Hore, 2012, Secure multidimensional range queries over outsourced data, VLDB J, 21, 333, 10.1007/s00778-011-0245-7 Hu, 2011, Processing private queries over untrusted data cloud through privacy homomorphism, 601 Kantarcioglu, 2004, Privately computing a distributed k-nn classifier, 279 Li, 2011, Authorized private keyword search over encrypted data in cloud computing, 383 Li, 2007, An active learning based TCM-KNN algorithm for supervised network intrusion detection, Comput Secur, 26, 459, 10.1016/j.cose.2007.10.002 Liao, 2002, Use of k-nearest neighbor classifier for intrusion detection, Comput Secur, 21, 439, 10.1016/S0167-4048(02)00514-X Liu, 2006, An attacker's view of distance preserving maps for privacy preserving data mining, 297 Ma, 2015, Social network and tag sources based augmenting collaborative recommender system, IEICE Trans Inf Syst, E98.D, 902, 10.1587/transinf.2014EDP7283 Meng Mykletun, 2006, Aggregation queries in the database-as-a-service model, 89 Pan, 2016, Security analysis on privacy-preserving cloud aided biometric identification schemes, 446 Papadopoulos, 2010, Nearest neighbor search with strong location privacy, vol. 3, 619 Popa, 2013, An ideal-security protocol for order-preserving encoding, 463 Qi, 2008, Efficient privacy-preserving k-nearest neighbor search, 311 Ren, 2015, Mutual verifiable provable data auditing in public cloud storage, J Internet Technol, 16, 317 Samanthula, 2015, K-nearest neighbor classification over semantically secure encrypted relational data, IEEE Trans Knowl Data Eng, 27, 1261, 10.1109/TKDE.2014.2364027 Shi, 2007, Multi-dimensional range query over encrypted data, 350 Su, 2011, Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification, J Netw Comput Appl, 34, 722, 10.1016/j.jnca.2010.10.009 Wang, 2016, Practical and secure nearest neighbor search on encrypted large-scale data Wang, 2010, Secure ranked keyword search over encrypted cloud data, 253 Wang, 2015, CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud, vol. 9327 Wen, 2015, A rapid learning algorithm for vehicle classification, Inf Sci (Ny), 295, 395, 10.1016/j.ins.2014.10.040 Wong, 2009, Secure knn computation on encrypted databases, 139 Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans Parallel Distrib Syst, 27, 340, 10.1109/TPDS.2015.2401003 Xiong, 2007, Mining multiple private databases using a knn classifier, 435 Xu, 2014, Building confidential and efficient query services in the cloud with RASP data perturbation, IEEE Trans Knowl Data Eng, 26, 322, 10.1109/TKDE.2012.251 Yang, 2006, Privacy-preserving queries on encrypted data, 479 Yao, 1982, Protocols for secure computations, 160 Yao, 2013, Secure nearest neighbor revisited, 733 Yiu, 2012, Outsourced similarity search on metric data assets, IEEE Trans Knowl Data Eng, 24, 338, 10.1109/TKDE.2010.222 Yuan, 2013, Efficient privacy-preserving biometric identification in cloud computing, 2652 Zhu, 2012, Efficient secure primitive for privacy preserving distributed computations, vol. 7631, 233 Zhu, 2013, Secure k-nn computation on encrypted cloud data without sharing key with query users, 55 Zhu, 2013, Secure k-NN query on encrypted cloud database without key-sharing, Int J Electron Secur Dig Forens, 5, 201, 10.1504/IJESDF.2013.058654 Zhu, 2014, Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data, IEICE Trans Inf Syst, E97-D, 10.1587/transinf.E97.D.326 Zhu, 2015, Fast secure scalar product protocol with (almost) optimal efficiency, 234 Zhu, 2016, Secure and controllable k-NN query over encrypted cloud data with key confidentiality, J Parallel Distrib Comput, 89, 1, 10.1016/j.jpdc.2015.11.004 Zhu, 2016, Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited Zhu, 2016, Secure k-NN query on encrypted cloud data with limited key-disclosure and offline data owner, 401