Skip to main content
Top

2020 | OriginalPaper | Chapter

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

Authors : Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti

Published in: Information and Communications Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Location-based services (LBSs) are widely deployed in commercial services. These services always depend on a service provider, e.g., a cloud server, to store the enormous amounts of geospatial data and to process various queries. For example, a Yelp user can retrieve a list of recommended cafés by submitting her/his current location to the service provider. While LBSs offer tremendous benefits, it is vital to safeguard users’ privacy against untrusted service providers. However, no prior secure k nearest neighbor query processing schemes satisfy the three security requirements of one-time, oblivious, and unlinkable. In particular, we are concerned with the problem of item exclusion: how to match one data query with each item on the cloud no more than once in an oblivious and unlinkable manner. In this paper, we propose the first secure k nearest neighbor query processing scheme, Obaq, that satisfies the above requirements. Obaq first introduces an item identifier into an existing secure k nearest neighbor query processing scheme. Each data owner inserts an item identifier and her/his location information into a secure index, and each data user transfers the identifier of a previously received data item and location information into a specific range. Then, Obaq excludes corresponding items via privacy-preserving range querying. We define strong index privacy and strong token privacy and formally prove the security of Obaq in the random oracle model. We further evaluate the performance of Obaq using a prototype and a real-world dataset. The experimental results show that Obaq is highly efficient and practical in terms of computational cost, communication overhead, and response delay.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Zhu, L., Li, M., Zhang, Z., Du, X., Guizani, M.: Big data mining of users’ energy consumption pattern in wireless smart grid. IEEE Wirel. Commun. 25(1), 84–89 (2018)CrossRef Zhu, L., Li, M., Zhang, Z., Du, X., Guizani, M.: Big data mining of users’ energy consumption pattern in wireless smart grid. IEEE Wirel. Commun. 25(1), 84–89 (2018)CrossRef
7.
go back to reference Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Proceedings of 20th International Conference on Information and Communications Security (ICICS), Lille, France, pp. 445–458, October 2018 Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Proceedings of 20th International Conference on Information and Communications Security (ICICS), Lille, France, pp. 445–458, October 2018
8.
go back to reference Zhao, Z., Luo, W., Shen, Q., Ruan, A.: CloudCoT: a blockchain-based cloud service dependency attestation framework. In: Proceedings of 21st International Conference on Information and Communications Security (ICICS), Beijing, China, December 2019 Zhao, Z., Luo, W., Shen, Q., Ruan, A.: CloudCoT: a blockchain-based cloud service dependency attestation framework. In: Proceedings of 21st International Conference on Information and Communications Security (ICICS), Beijing, China, December 2019
11.
go back to reference Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of 35th ACM SIGMOD International Conference on Management of Data (SIGMOD), Providence, USA, pp. 139–152, June 2009 Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of 35th ACM SIGMOD International Conference on Management of Data (SIGMOD), Providence, USA, pp. 139–152, June 2009
12.
go back to reference Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environment. In: Proceedings of IEEE 30rd International Conference on Data Engineering (ICDE), Chicago, USA, pp. 664–675, March 2014 Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environment. In: Proceedings of IEEE 30rd International Conference on Data Engineering (ICDE), Chicago, USA, pp. 664–675, March 2014
13.
go back to reference Li, R., Liu, A., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. In: Proceedings of 40th International Conference on Very Large Data Bases (VLDB), Hangzhou, China, pp. 1953–1964, September 2014 Li, R., Liu, A., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. In: Proceedings of 40th International Conference on Very Large Data Bases (VLDB), Hangzhou, China, pp. 1953–1964, September 2014
14.
go back to reference Li, R., Liu, A.X.: Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: Proceedings of IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, USA, pp. 697–708, April 2017 Li, R., Liu, A.X.: Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: Proceedings of IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, USA, pp. 697–708, April 2017
15.
go back to reference Secure KNN queries over encrypted data: dimensionality is not always a curse. In: Proceedings of IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, USA, pp. 231–234, April 2017 Secure KNN queries over encrypted data: dimensionality is not always a curse. In: Proceedings of IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, USA, pp. 231–234, April 2017
16.
go back to reference Lei, X., Liu, A.X., Li, R., Tu, G.-H.: SecEQP: a secure and efficient scheme for SkNN query problem over encrypted geodata on cloud. In: Proceedings of 35th IEEE International Conference on Data Engineering (ICDE), Macao, China, pp. 662–673, April 2019 Lei, X., Liu, A.X., Li, R., Tu, G.-H.: SecEQP: a secure and efficient scheme for SkNN query problem over encrypted geodata on cloud. In: Proceedings of 35th IEEE International Conference on Data Engineering (ICDE), Macao, China, pp. 662–673, April 2019
17.
go back to reference Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: Proceedings of 35th Annual IEEE International Conference on Computer Communications (INFOCOM), San Francisco, USA, pp. 1–9, April 2016 Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: Proceedings of 35th Annual IEEE International Conference on Computer Communications (INFOCOM), San Francisco, USA, pp. 1–9, April 2016
18.
go back to reference Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Data recovery on encrypted databases with k-nearest neighbor query leakage. In: Proceedings of 40th IEEE Symposium on Security and Privacy (SP), San Francisco, USA, pp. 1033–1050, May 2019 Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Data recovery on encrypted databases with k-nearest neighbor query leakage. In: Proceedings of 40th IEEE Symposium on Security and Privacy (SP), San Francisco, USA, pp. 1033–1050, May 2019
19.
go back to reference Liu, A.X., Chen, F.: Collaborative enforcement of firewall policies in virtual private networks. In: Proceedings of 27th ACM Symposium on Principles of Distributed Computing (PODC), Canada, Toronto, pp. 95–104, August 2008 Liu, A.X., Chen, F.: Collaborative enforcement of firewall policies in virtual private networks. In: Proceedings of 27th ACM Symposium on Principles of Distributed Computing (PODC), Canada, Toronto, pp. 95–104, August 2008
20.
go back to reference Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of 28th ACM Symposium on Theory of Computing (STOC), Philadelphia, USA, pp. 639–648, May 1996 Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of 28th ACM Symposium on Theory of Computing (STOC), Philadelphia, USA, pp. 639–648, May 1996
21.
go back to reference Song, D.X. Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 21st IEEE Symposium on Security and Privacy (S&P), San Francisco, USA, pp. 44–55, May 2000 Song, D.X. Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 21st IEEE Symposium on Security and Privacy (S&P), San Francisco, USA, pp. 44–55, May 2000
22.
go back to reference Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of 31st Annual Cryptology Conference (CRYPTO), Santa Barbara, USA, pp. 578–595, August 2011 Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of 31st Annual Cryptology Conference (CRYPTO), Santa Barbara, USA, pp. 578–595, August 2011
23.
go back to reference Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, USA, pp. 965–976, October 2012 Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, USA, pp. 965–976, October 2012
24.
go back to reference Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedinhs of 21st Annual Network and Distributed System Security Symposium (NDSS), San Diego, USA, pp. 1–16, February 2014 Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedinhs of 21st Annual Network and Distributed System Security Symposium (NDSS), San Diego, USA, pp. 1–16, February 2014
25.
go back to reference Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of 13th ACM Computer and Communications Security Conference (CCS), Alexandria, USA, pp. 79–88, November 2006 Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of 13th ACM Computer and Communications Security Conference (CCS), Alexandria, USA, pp. 79–88, November 2006
26.
go back to reference Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2015)MATH Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2015)MATH
Metadata
Title
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud
Authors
Yifei Chen
Meng Li
Shuli Zheng
Donghui Hu
Chhagan Lal
Mauro Conti
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-61078-4_20

Premium Partner