Secure k-NN computation on encrypted cloud data without sharing key with query users

Youwen Zhu, Rui Xu, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Abstract

In cloud computing, secure analysis on outsourced encrypted data is a significant topic. As a frequently used query for online applications, secure k-nearest neighbors (k-NN) computation on encrypted cloud data has received much attention, and several solutions for it have been put forward. However, most existing schemes assume the query users are fully trusted and all query users share the total key which is used to encrypt and decrypt data owner's outsourced data. It is constitutionally not feasible in lots of real-world applications. In this paper, we propose a novel secure and efficient scheme for k-NN query on encrypted cloud data in which the key of data owner to encrypt and decrypt ousourced data will not be completely disclosed to any query user. Therefore, our scheme can efficiently support the secure k-NN query on encrypted cloud data even when query users are not trustworthy enough.

Original languageEnglish
Title of host publicationCloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing
Pages55-60
Number of pages6
DOIs
Publication statusPublished - Jun 7 2013
Event2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013 - Hangzhou, China
Duration: May 8 2013May 8 2013

Publication series

NameCloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing

Other

Other2013 1st International Workshop on Security in Cloud Computing, Cloud Computing 2013
CountryChina
CityHangzhou
Period5/8/135/8/13

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Software

Cite this

Zhu, Y., Xu, R., & Takagi, T. (2013). Secure k-NN computation on encrypted cloud data without sharing key with query users. In Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing (pp. 55-60). (Cloud Computing 2013 - Proceedings of the 2013 International Workshop on Security in Cloud Computing). https://doi.org/10.1145/2484402.2484415