Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 8109730, 15 pages
https://doi.org/10.1155/2017/8109730
Research Article

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

1School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, China
2School of Software, North University of China, Taiyuan, Shanxi 030051, China
3Department of Computer Science and Technology, Dalian Neusoft University, Dalian, Liaoning 116023, China

Correspondence should be addressed to Jun Hong; nc.ude.cun@nujgnoh

Received 20 May 2017; Revised 1 October 2017; Accepted 5 November 2017; Published 13 December 2017

Academic Editor: M. L. R. Varela

Copyright © 2017 Jun Hong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Armbrust, F. Armando, R. Griffith, D. A. Joseph, and R. H. Katz, “Technical Report UCB/EECS-2009-28,” Tech. Rep., Eecs Department, University of California, Berkeley, 2009. View at Google Scholar
  2. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of The ACM, vol. 53, no. 4, pp. 50–58, 2010. View at Google Scholar · View at Scopus
  3. M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” Journal of Network and Computer Applications, vol. 40, no. 1, pp. 325–344, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. P. M. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Tech. Rep. SP 800-145, National Institute of Standards & Technology, 2011. View at Google Scholar
  5. I. Emanuel Baciu, “Advantages and disadvantages of cloud computing services,” from the employees point of view, 2015. View at Google Scholar
  6. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24–31, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. E. Mykletun and G. Tsudik, “Aggregation queries in the database-as-a-service model,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 4127, pp. 89–103, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the database-service-provider model,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '02), pp. 216–227, Madison, Wis, USA, June 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Agrawal, J. Kiernan, R. Srikant, and Y. R. Xu, “Order preserving encryption for numeric data,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '04), pp. 563–574, ACM, Paris, France, June 2004. View at Scopus
  11. S. R. M. Oliveira and O. R. Zaiane, “Privacy preserving clustering by data transformation,” Journal of Information and Data Management, vol. 1, no. 1, p. 37, 2010. View at Google Scholar
  12. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS '09), pp. 139–152, Providence, RI, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Zhu, R. Xu, and T. Takagi, “Secure k-NN computation on encrypted cloud data without sharing key with query users,” in Proceedings of the 2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013, pp. 55–60, China, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Zhu, Z. Huang, and T. Takagi, “Secure and controllable k-NN query over encrypted cloud data with key confidentiality,” Journal of Parallel and Distributed Computing, vol. 89, pp. 1–12, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. M. L. Yiu, E. Lo, and D. Yung, “Authentication of moving kNN queries,” in Proceedings of the 2011 IEEE 27th International Conference on Data Engineering, ICDE 2011, pp. 565–576, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Jing, L. Hu, W.-S. Ku, and C. Shahabi, “Authentication of k nearest neighbor query on road networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 6, pp. 1494–1506, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. D. A. White and R. Jain, “Similarity indexing with the SS-tree,” in Proceedings of the 1996 IEEE 12th International Conference on Data Engineering, pp. 516–523, March 1996. View at Scopus
  18. H. Delfs and H. Knebl, Introduction to cryptography, Information Security and Cryptography, Springer, Berlin, Second edition, 2007. View at MathSciNet
  19. K. Liu, C. Giannella, and H. Kargupta, “An attacker’s view of distance preserving maps for privacy preserving data mining,” in Knowledge Discovery in Databases: PKDD 2006, vol. 4213 of Lecture Notes in Computer Science, pp. 297–308, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  20. L. Y. Man, G. Ghinita, C. S. Jensen, and P. Kalnis, “Outsourcing search services on private spatial data,” in Proceedings of the 25th IEEE International Conference on Data Engineering, ICDE 2009, pp. 1140–1143, China, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Chen, R. Kavuluru, and S. Guo, “RASP: Efficient multidimensional range query on attack-resilient encrypted databases,” in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY'11, pp. 249–260, USA, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. C.-Y. Chow, M. F. Mokbel, and W. G. Aref, “Casper*: query processing for location services without compromising privacy,” ACM Transactions on Database Systems (TODS), vol. 34, no. 4, article 24, 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan, “Verifying completeness of relational query results in data publishing,” in Proceedings of the SIGMOD 2005: ACM SIGMOD International Conference on Management of Data, pp. 407–418, USA, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Narasimha and G. Tsudik, “DSAC: Integrity for outsourced databases with signature aggregation and chaining,” in Proceedings of the CIKM'05 - Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 235-236, Germany, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Zhang, C. Hong, and C. Chen, “Server transparent query authentication of outsourced database,” Journal of Computer Research and Development, vol. 1, no. 28, pp. 182–190, 2010. View at Google Scholar · View at Scopus
  27. J. Hong, T. Wen, Q. Gu, and G. Sheng, “Query integrity verification based-on MAC chain in cloud storage,” in Proceedings of the 2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings, pp. 125–129, China, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Cryptology — EUROCRYPT 2003, vol. 2656 of Lecture Notes in Computer Science, pp. 416–432, Springer, Berlin, Heidelberg, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  29. R. C. Merkle, “A certified digital signature. in advances in cryptology,” in Proceedings of the International Cryptology Conference, CRYPTO 89, pp. 218–238, Santa Barbara, Calif, Usa, 1989.
  30. P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, “Authentic data publication over the internet,” Journal of Computer Security, vol. 11, no. 3, pp. 291–314, 2003. View at Publisher · View at Google Scholar · View at Scopus
  31. H. H. Pang and K. L. Tan, “Authenticating query results in edge computing,” in Proceedings of the Proceedings - 20th International Conference on Data Engineering - ICDE 2004, pp. 560–571, USA, April 2004. View at Publisher · View at Google Scholar · View at Scopus
  32. F. Li, M. Hadjileftheriou, G. Kollios, and L. Reyzin, “Authenticated index structures for outsourced databases,” Handbook of Database Security: Applications and Trends, pp. 115–136, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. W. Cheng, H. H. Pang, and K. L. Tan, “Authenticating multi-dimensional query results in data publishing,” in Lecture Notes in Computer Science, vol. 4127, pp. 60–73, 2006. View at Google Scholar
  34. Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, “Spatial outsourcing for location-based services,” in Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08, pp. 1082–1091, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  35. M. Xie, H. Wang, J. Yin, and X. Meng, “Integrity auditing of outsourced data,” in Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 782–793, aut, September 2007. View at Scopus
  36. H. Wang, J. Yin, C.-S. Perng, and P. S. Yu, “Dual encryption for query integrity assurance,” in Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM'08, pp. 863–872, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. B. Thompson, S. Haber, W. G. Horne, T. Sander, and D. Yao, “Privacy-preserving computation and verification of aggregate queries on outsourced databases,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 5672, pp. 185–201, 2009. View at Publisher · View at Google Scholar · View at Scopus
  38. B. Thompson, S. Haber, W. G. Horne, T. Sander, and D. Yao, “Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity,” In Privacy Enhancing Technologies, 2009. View at Google Scholar · View at Scopus
  39. B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, “On private scalar product computation for privacy-preserving data mining,” in Information Security and Cryptology – ICISC 2004, vol. 3506 of Lecture Notes in Computer science, pp. 104–120, Springer, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  40. C. Cachin, S. Micali, and M. Stadler, “Computationally private information retrieval with polylogarithmic communication,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 1592, pp. 402–414, 1999. View at Publisher · View at Google Scholar · View at Scopus
  41. A. Guttman, “R-trees: a dynamic index structure for spatial searching,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '84), pp. 47–57, ACM, 1984. View at Publisher · View at Google Scholar