2015
DOI: 10.1002/sec.1245
|View full text |Cite
|
Sign up to set email alerts
|

Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

Abstract: With rapid advances in wireless communication, mobile devices and positioning technologies, location‐based services (LBS) have recently emerged as one of today's most important applications in mobile networks. To obtain great flexibility and cost savings, LBS providers may outsource their data services to the cloud. However, to protect data privacy, sensitive data have to be encrypted before outsourcing, which may impede the functionality and performance of the data services. In this paper, to make one step cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…However, this scheme leaks information to an attacker knowing some of the points in S [23], in addition some data leaks to the management system. In [7], Cheng et al proposed a similar faster scheme where their speedup was achieved by using a secure index. Their scheme relies upon a cloud server that does not collude with the data owner, a model which is not always possible or trusted.…”
Section: Related Workmentioning
confidence: 99%
“…However, this scheme leaks information to an attacker knowing some of the points in S [23], in addition some data leaks to the management system. In [7], Cheng et al proposed a similar faster scheme where their speedup was achieved by using a secure index. Their scheme relies upon a cloud server that does not collude with the data owner, a model which is not always possible or trusted.…”
Section: Related Workmentioning
confidence: 99%
“… Hu et al (2011) proposed a secure traversal framework that can used, together with privacy homomorphism, to achieve secure k -NN query processing protocol. Cheng et al (2015) proposed a privacy-preserving protocol that employs an encrypted hierarchical index tree to perform k -NN queries over spatial data outsourced to cloud in encrypted form. All three protocols ( Hu et al, 2011 ; Zhu, Huang & Takagi, 2016 ; Cheng et al, 2015 ) leak data access pattern to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“… Cheng et al (2015) proposed a privacy-preserving protocol that employs an encrypted hierarchical index tree to perform k -NN queries over spatial data outsourced to cloud in encrypted form. All three protocols ( Hu et al, 2011 ; Zhu, Huang & Takagi, 2016 ; Cheng et al, 2015 ) leak data access pattern to the cloud. On the other hand, Kesarwani et al (2018) proposed a secure k -NN query processing protocol over encrypted data by utilizing a leveled fully homomorphic encryption scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Searchable encryption (SE) is a hot topic in cryptography that seeks protocols permitting efficient search on outsourced encrypted data. While most solutions focus on the basic query types such as exact match and range queries, in recent years, there is a rise of interest in SE schemes for kNN queries, e.g., [5,9,23,29,30]. However, there are still no solutions for kNN or AkNN search providing strong security guarantees.…”
Section: Introductionmentioning
confidence: 99%