Abstract
Cloud computing has emerged as a new platform for storing and managing databases. As a result, a database outsourcing paradigm has gained much interests. To prevent the contents of outsourced databases from being revealed to cloud computing, databases must be encrypted before being outsourced to the cloud. Therefore, various Top-k query processing techniques have been proposed for encrypted databases. However, there is no existing work that can not only hide data access patterns, but also preserve the privacy of user query. To solve the problems, in this paper, we propose a new privacy-preserving Top-k query processing algorithm. Our algorithm protects the user query from the cloud and conceals data access patterns during query processing. A performance analysis shows that the proposed scheme provide good scalability without any information leakage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: privacy risks and approaches. In: Proceedings of the CRiSIS, pp. 1–9 (2012_
Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multidimensional range query over encrypted data. In: Symposium on Security and Privacy, pp. 350–364 (2007)
Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J 21(3), 333–358 (2012)
Elmehdwi, Y., Samanthula, B., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceedings of the ICDE, pp. 664–675 (2014)
Kim, H., Kim, H., Chang, J.: A kNN query processing algorithm using a tree index structure on the encrypted database. In: Proceedings of the Big Data and Smart Computing, pp. 93–100 (2016)
Xiong, L., Chitti, S., Liu, L.: Topk queries across multiple private databases. In: Proceedings of the Distributed Computing Systems, pp. 145–154 (2005)
Vaidya, J., Christopher, W.: Privacy-preserving kth element score over vertically partitioned data. TKDE 21(2), 253–258 (2009)
Burkhart, M., Dimitropoulos, X.: Fast privacy-preserving top-k queries using secret sharing. In: Proceedings of the Computer Communications and Networks, pp. 1–7 (2010)
Kim, M., Mohaisen, A., Cheon, J., Kim, M.: Private over-threshold aggregation protocols. In: Proceedings of the Information Security and Cryptology, pp. 472–486 (2013)
Fagin, R.: Combining fuzzy information from multiple systems. In: Proceedings of the Principles of Database Systems, pp. 216–226 (1996)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the EUROCRYPT, pp. 223–238 (1999)
Carmit, H., Lindell, Y.: Efficient secure two-party protocols: techniques and constructions (2010)
Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: Proceedings of the ICDE, pp. 66–77 (2015)
Goldreich, O.: The Foundations of Cryptography: Encryption Schemes, vol. 2, Cambridge, U.K., pp. 373–470 (2004). http://www.wisdom.weizmann.ac.il/~oded/PSBookFrag/enc.ps
Bugiel, S., Nürnberger, S., Sadeghi, A., Schneider, T.: Twin clouds: secure cloud computing with low latency. In: Proceedings of the CMS, pp. 32–44 (2011)
Samanthula, B., Chun, H., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: Proceedings of the ASIACCS, pp. 541–546 (2013)
Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
Al-Hussaeni, K., Fung, B., Cheung, W.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89–109 (2014)
Kim, H., Kim, Y., Chang, J.: A grid-based cloaking area creation scheme for continuous LBS queries in distributed systems. J. Converg. 4(1), 23–30 (2013)
Acknowledgements
This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No. R0113-16-0005, Development of a Unified Data Engineering Technology for Large-scale Transaction Processing and Real-time Complex Analytics). This work was also supported by the Human Resource Training Program for Regional Innovation and Creativity through the Ministry of Education and National Research Foundation of Korea (NRF-2016H1C1A1065816).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kim, HI., Kim, HJ., Chang, JW. (2017). A Privacy-Preserving Top-k Query Processing Algorithm in the Cloud Computing. In: Bañares, J., Tserpes, K., Altmann, J. (eds) Economics of Grids, Clouds, Systems, and Services. GECON 2016. Lecture Notes in Computer Science(), vol 10382. Springer, Cham. https://doi.org/10.1007/978-3-319-61920-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-61920-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61919-4
Online ISBN: 978-3-319-61920-0
eBook Packages: Computer ScienceComputer Science (R0)