Towards multi-user, secure, and verifiable kNN query in cloud database

Ningning Cui, Kang Qian, Taotao Cai, Jianxin Li, Xiaochun Yang, Jie Cui, Hong Zhong

Research output: Contribution to journalArticlepeer-review

9 Citations (Scopus)

Abstract

With the boom in cloud computing, data outsourcing in location-based services is proliferating and has attracted increasing interest from research communities and commercial applications. Nevertheless, since the cloud server is probably both untrusted and malicious, concerns about data security and result integrity have become on the rise sharply. In addition, in the single-user situation assumed by most existing works, query users can capture query content from each other even though the queries are encrypted, which may incur the leakage of query privacy. Unfortunately, there exists little work that can commendably assure data security and result integrity in the multi-user setting. To this end, in this paper, we study the problem of m ulti-user, s ecure, and v erifiable k n earest n eighbor query ( MSV k NN ). To support MSV k NN, we first propose a novel unified structure, called verifiable and secure index (VSI). Based on this, we devise a series of secure protocols to facilitate query processing and develop a compact verification strategy. Given an MSV k NN query, our proposed solution can not merely answer the query efficiently while can guarantee: 1) preserving data privacy , query privacy , result privacy , and access patterns privacy ; 2) authenticating the correctness and completeness of the results; 3) supporting multi-user with different keys. Finally, the formal security analysis and complexity analysis are theoretically proven and the performance and feasibility of our proposed approach are empirically evaluated and demonstrated.
Original languageEnglish
Pages (from-to)9333-9349
Number of pages17
JournalIEEE Transactions on Knowledge and Data Engineering
Volume35
Issue number9
Early online date20 Jan 2023
DOIs
Publication statusPublished - Sept 2023

Fingerprint

Dive into the research topics of 'Towards multi-user, secure, and verifiable kNN query in cloud database'. Together they form a unique fingerprint.

Cite this