Top-k Query Processing Over Outsourced Encrypted Data
نویسندگان
چکیده
Nowadays, cloud data outsourcing provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the user data against security attacks is to encrypt the data before being sent to the cloud servers. Then, the main problem is to evaluate user queries over the encrypted data. In this paper, we address the problem of top-k query processing over encrypted data, and propose an efficient approach called BuckTop. Our approach uses the bucketization technique to manage the encrypted data in the remote server. It includes a top-k query processing algorithm that works on the encrypted data of the buckets, and returns a set that contains the encrypted top-k results. It also has a filtering algorithm that efficiently eliminates the false positives in the server side. We implemented BuckTop, and compared its response time for processing top-k queries over encrypted data with that of the TA algorithm over original (plaintext) data. Our results show excellent performance gains. They show that the response time of BuckTop over encrypted data is close to TA over plaintext data. Key-words: top-k query, cloud, security, encrypted data ∗ Email: [email protected] † Email: [email protected] ‡ Email: [email protected] Traitement de requêtes Top-k sur les donnés cryptées Résumé : Aujourd’hui cloud computing fournit aux utilisateurs et aux entreprises des capacites puissantes pour stocker et traiter leurs donnees. Cependant, la confidentialité des données externalisées n’est pas garantie par les fournisseurs de cloud. Une solution pour protéger les données utilisateur contre les attaques de sécurité consiste à chiffrer les données avant d’être envoyée aux serveurs. Ensuite, le problème principal est d’évaluer les requêtes des utilisateurs sur les données cryptées. Dans ce travail, nous abordons le problème du traitement des requêtes top-k sur les données chiffrées et proposons une approche efficace appelée BuckTop. Notre approche utilise la technique de bucketization pour gérer les données cryptées dans le serveur distant. Il comprend un algorithme de traitement de requêtes top-k qui fonctionne sur les données cryptées des seaux et renvoie un ensemble qui contient les résultats top-k cryptés. Il a également un algorithme de filtrage qui élimine efficacement les faux positifs du côté du serveur. Nous avons mis en place BuckTop et comparé son temps de réponse pour traiter les requêtes top-k sur des données cryptées avec celles de l’algorithme TA sur des données originales (en clair). Nos résultats affichent d’excellents gains de performance. Ils montrent que le temps de réponse de BuckTop sur les données chiffrées est proche de TA sur les données en clair. Mots-clés : top-l, cloud, sécurité Top-k Query Processing Over Outsourced Encrypted Data 3
منابع مشابه
Secure Top-k Query Processing on Encrypted Databases
Privacy concerns in outsourced cloud databases have become more and more important recentlyand many efficient and scalable query processing methods over encrypted data have been proposed.However, there is very limited work on how to securely process top-k ranking queries over encrypteddatabases in the cloud. In this paper, we focus exactly on this problem: secure and efficient proce...
متن کاملA k-Nearest Neighbor Search Algorithm for Enhancing Data Privacy in Outsourced Spatial Databases
With the advancement of cloud computing technologies and the propagation of locationbased services, research on outsourced spatial databases has been spotlighted. Therefore, the traditional spatial databases owners want to outsource their resources to a service provider so that they can reduce cost for storage and management. However, the issue of privacy preservation is crucial in spatial data...
متن کاملSecure k-NN as a Service Over Encrypted Data in Multi-User Setting
To securely leverage the advantages of Cloud Computing, recently a lot of research has happened in the area of “Secure Query Processing over Encrypted Data”. As a concrete use case, many encryption schemes have been proposed for securely processing k Nearest Neighbors (SkNN) over encrypted data in the outsourced setting. Recently Zhu et al.[25] proposed a SkNN solution which claimed to satisfy ...
متن کاملK-Nearest Neighbor Categorization on Secure Data Access in Cloud
For the last few years, a extensive research has been going on query processing of relation data and more practical and theoretical solution have been suggested to query processing under different scenarios. Now days cloud computing technology is increasing rapidly, so users now have the chance to store their data in remote location. However, different privacy issues are raised on cloud computi...
متن کاملLightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases
With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that can be performed on the cloud side. Especially, evaluating queries over the encrypted data stored on the cloud wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017