Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data

Youwen Zhu, Tsuyoshi Takagi, Rong Hu

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

Recently, Yuan et al. (IEEE Infocom '13, pp.2652-2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan's scheme can be broken by the collusion attack without deducing the key, and present a simple but powerful attack to their scheme. Experiment results validate the high efficiency of our attacking approach. Additionally, we also indicate an upper bound of collusion-resistant ability of any accurate SNN query scheme.

Original languageEnglish
Pages (from-to)326-330
Number of pages5
JournalIEICE Transactions on Information and Systems
VolumeE97-D
Issue number2
DOIs
Publication statusPublished - 2014

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint Dive into the research topics of 'Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data'. Together they form a unique fingerprint.

  • Cite this