Advertisement

Answering Top-k Queries over Outsourced Sensitive Data in the Cloud

  • Sakina Mahboubi
  • Reza Akbarinia
  • Patrick Valduriez
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11029)

Abstract

The cloud provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the user data is to encrypt it before sending to the cloud. Then, the main problem is to evaluate user queries over the encrypted data.

In this paper, we consider the problem of answering top-k queries over encrypted data. We propose a novel system, called BuckTop, designed to encrypt and outsource the user sensitive data to the cloud. BuckTop comes with a top-k query processing algorithm that is able to process efficiently top-k queries over the encrypted data, without decrypting the data in the cloud data centers.

We implemented BuckTop and compared its performance for processing top-k queries over encrypted data with that of the popular threshold algorithm (TA) over original (plaintext) data. The results show the effectiveness of BuckTop for outsourcing sensitive data in the cloud and answering top-k queries.

Keywords

Cloud Sensitive data Top-k query 

Notes

Acknowledgement

The research leading to these results has received funding from the European Union’s Horizon 2020 - The EU Framework Programme for Research and Innovation 2014–2020, under grant agreement No. 732051.

References

  1. 1.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: SIGMOD Conference, pp. 563–574 (2004)Google Scholar
  2. 2.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005).  https://doi.org/10.1007/11496137_30CrossRefGoogle Scholar
  3. 3.
    Choi, S., Ghinita, G., Lim, H.-S., Bertino, E.: Secure kNN query processing in untrusted cloud environments. In: IEEE TKDE, pp. 2818–2831 (2014)Google Scholar
  4. 4.
    Coles, C., Yeoh, J.: Cloud adoption practices and priorities survey report. Technical report, Cloud Security Alliance report, January 2015Google Scholar
  5. 5.
    Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-k similarity search over encrypted data. In: IEEE TDSC no. 99, pp. 1–14 (2017)Google Scholar
  6. 6.
    Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE Conference (2014)Google Scholar
  7. 7.
    Fagin, R.: Combining fuzzy information from multiple systems. J. Comput. Syst. Sci. 58(1), 83–99 (1999)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Fagin, R., Lotem, A., Naor, M.: Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci. 66(4), 614–656 (2003)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012)CrossRefGoogle Scholar
  10. 10.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB Conference, pp. 720–731 (2004)Google Scholar
  11. 11.
    Islam, M.S., Kuzu, M., Kantarcioglu, M.: Inference attack against encrypted range queries on outsourced databases. In: ACM CODASPY, pp. 235–246 (2014)Google Scholar
  12. 12.
    Kim, H.-I., Kim, H.-J., Chang, J.-W.: A privacy-preserving top-k query processing algorithm in the cloud computing. In: Bañares, J.Á., Tserpes, K., Altmann, J. (eds.) GECON 2016. LNCS, vol. 10382, pp. 277–292. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-61920-0_20CrossRefGoogle Scholar
  13. 13.
    Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. PVLDB 7(14), 1953–1964 (2014)Google Scholar
  14. 14.
    Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Global Communications Conference (GLOBECOM), pp. 335–341 (2012)Google Scholar
  15. 15.
    Mahboubi, S., Akbarinia, R., Valduriez, P.: Top-k query processing over outsourced encrypted data. Research report RR-9053, INRIA (2017)Google Scholar
  16. 16.
    Sahin, C., Allard, T., Akbarinia, R., El Abbadi, A., Pacitti, E.: A differentially private index for range query processing in clouds. In: ICDE Conference (2018)Google Scholar
  17. 17.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S&P, pp. 44–55 (2000)Google Scholar
  18. 18.
    Vaidya, J., Clifton, C.: Privacy-preserving top-k queries. In: ICDE Conference, pp. 545–546 (2005)Google Scholar
  19. 19.
    Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD Conference, pp. 139–152 (2009)Google Scholar
  20. 20.
    Zhu, H., Meng, X., Kollios, G.: Top-k query processing on encrypted databases with strong security guarantees. In: ICDE Conference (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Sakina Mahboubi
    • 1
  • Reza Akbarinia
    • 1
  • Patrick Valduriez
    • 1
  1. 1.INRIA and LIRMM, University of MontpellierMontpellierFrance

Personalised recommendations