Secure k-NN computation on encrypted cloud data without sharing key with query users

Youwen Zhu, Rui Xu, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

51 Citations (Scopus)

Abstract

In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbors (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users share the total key which is used to encrypt and decrypt data owner's outsourced data. It is constitutionally not feasible in lots of real-world applications. In this paper, we propose a novel secure and efficient scheme for k-NN query on encrypted cloud data in which the key of data owner to encrypt and decrypt ousourced data will not be completely disclosed to any query user. Therefore, our scheme can efficiently support the secure k-NN query on encrypted cloud data even when query users are not trustworthy enough.

Original languageEnglish
Title of host publicationCloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing
Pages55-60
Number of pages6
DOIs
Publication statusPublished - 2013
Event2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013 - Hangzhou, China
Duration: May 8 2013May 8 2013

Publication series

NameCloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing

Other

Other2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013
Country/TerritoryChina
CityHangzhou
Period5/8/135/8/13

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Secure k-NN computation on encrypted cloud data without sharing key with query users'. Together they form a unique fingerprint.

Cite this