4.5 Article

Secure kNN query of outsourced spatial data using two-cloud architecture

期刊

JOURNAL OF SUPERCOMPUTING
卷 -, 期 -, 页码 -

出版社

SPRINGER
DOI: 10.1007/s11227-023-05495-7

关键词

Access pattern; Grid index; Paillier encryption; Two-cloud architecture; Voronoi diagram

向作者/读者索取更多资源

Cloud service providers offer virtual servers with powerful processors and large storage capacity at nominal fees. However, storing data on the cloud poses privacy risks, and user queries can be monitored by attackers and cloud operators.
Cloud service providers can offer virtual servers, with powerful processors and massive storage capacity for nominal per-use charges. With the underlying resources, the cloud allows data owners to trade capital expense for the variable cost. The auto-scaling features of the cloud can control the consumption of computing resources and hence the associated cost. However, by saving data on the cloud, the privacy of data becomes at risk. Data becomes exposed to the untrusted cloud. The users' queries can also be monitored by attackers and cloud operators. Furthermore, the pattern of accessing data can be identified. The solution is to encrypt data before outsourcing to the cloud. However, answering queries over encrypted data becomes a challenge. This paper proposes a novel technique, called Secure Voronoi kNN (SVK), that answers k-nearest neighbor (kNN) queries over encrypted data in a two-cloud architecture. SVK can hide data access patterns from the cloud.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据