4.7 Article

Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 11, Issue 5, Pages 796-809

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2015.2481900

Keywords

Cloud computing; location-based services; privacy; spatial keyword query; data outsourcing

Funding

  1. National Natural Science Foundation of China [61170274, 61502047]
  2. National Key Basic Research Program (973 Program) of China [2011CB302506]
  3. Fundamental Research Funds for the Central Universities [2014RC1103]

Ask authors/readers for more resources

With the rapid development of location-based services in mobile Internet, spatial keyword queries have been widely employed in various real-life applications in recent years. To realize the great flexibility and cost savings, more and more data owners are motivated to outsource their spatio-textual data services to the cloud. However, directly outsourcing such services to the untrusted cloud may arise serious privacy concerns. In this paper, we study the privacy-preserving top-k spatial keyword query problem in untrusted cloud environments. Existing studies primarily focus on the design of privacy-preserving schemes for either spatial or keyword queries, and they cannot be applied to solve the privacy-preserving spatial keyword query problem. To address this problem, we present a novel privacy-preserving top-k spatial keyword query scheme. In particular, we build an encrypted tree index to facilitate privacy-preserving top-k spatial keyword queries, where spatial and textual data are encrypted in a unified way. To search with the encrypted tree index, we propose two effective techniques for the similarity computations between queries and tree nodes under encryption. To improve query performance on large-scale spatio-textual data, we further propose a keyword-based secure pruning method. Thorough analysis shows the validity and security of our scheme. Extensive experimental results on real datasets demonstrate our scheme achieves high efficiency and good scalability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available