Secure k-NN as a Service Over Encrypted Data in Multi-User Setting

نویسندگان

  • Gagandeep Singh
  • Akshar Kaul
  • Sameep Mehta
چکیده

To securely leverage the advantages of Cloud Computing, recently a lot of research has happened in the area of “Secure Query Processing over Encrypted Data”. As a concrete use case, many encryption schemes have been proposed for securely processing k Nearest Neighbors (SkNN) over encrypted data in the outsourced setting. Recently Zhu et al.[25] proposed a SkNN solution which claimed to satisfy following four properties: (1)Data Privacy, (2)Key Confidentiality, (3)Query Privacy, and (4)Query Controllability. However, in this paper, we present an attack which breaks the Query Controllability claim of their scheme. Further, we propose a new SkNN solution which satisfies all the four existing properties along with an additional essential property of Query Check Verification. We analyze the security of our proposed scheme and present the detailed experimental results to showcase the efficiency in real world scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. Howeve...

متن کامل

Efficient Encrypted Data Comparison Through a Hybrid Method

With the development of smart city, user data are all transformed in encrypted form to protect user privacy. Secure comparison in encrypted form is the fundamental operation of many secure encrypted data analysis tasks, such as secure k-NN query and classification, Bayesian classification. Thus, it is important to achieve an efficient secure encrypted data comparison scheme. Recently, some meth...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Muti-keyword Search with Preserving Privacy over Encrypted Data in the Cloud

Cloud computing has become fame in the society and more users and more data owners centralize their secure data into the cloud. As there is huge amount of data files that are stores in the cloud server, it is important to provide security for the cloud and for the keyword based search service to data user. Here in order to protect this data, sensitive data is usually encrypted before ending the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1801.04725  شماره 

صفحات  -

تاریخ انتشار 2018