Secure and efficient k-nearest neighbor query for location-based services in outsourced environments

  • Haiqin Wu
  • Liangmin Wang
  • Tao Jiang



This work was supported by National Natural Science Foundation of China (Grant Nos. 61272074, U1405255), and Industrial Science and Technology Foundation of Zhenjiang City (Grant No. GY2013030).

Supplementary material

11432_2017_9090_MOESM1_ESM.pdf (353 kb)
Supplementary material, approximately 353 KB.


  1. 1.
    Wong W K, Cheung D W, Kao B, et al. Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of data, New York, 2009. 139–152Google Scholar
  2. 2.
    Hu H, Xu J, Ren C, et al. Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of IEEE 27th International Conference on Data Engineering, Hannover, 2011. 601–612Google Scholar
  3. 3.
    Padashetty N, Nadagoudar R. Confidential and secure query services in the cloud with rasp. Int J Comput Sci Mobile Comput, 2015, 4: 592–600Google Scholar
  4. 4.
    Elmehdwi Y, Samanthula B K, Jiang W. Secure knearest neighbor query over encrypted data in outsourced environments. In: Proceedings of IEEE 30th International Conference on Data Engineering, Chicago, 2014. 664–675Google Scholar
  5. 5.
    Yao B, Li F F, Xiao X K. Secure nearest neighbor revisited. In: Proceedings of IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, 2013. 733–744Google Scholar
  6. 6.
    Choi S, Ghinita G, Lim H S, et al. Secure knn query processing in untrusted cloud environments. IEEE Trans Knowl Data Eng, 2014, 26: 2818–2831CrossRefGoogle Scholar
  7. 7.
    Kim H I, Hong S, Chang J W. Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng, 2016, 104: 32–44CrossRefGoogle Scholar
  8. 8.
    Xu H. An approximate nearest neighbor query algorithm based on Hilbert curve. In: Proceedings of IEEE International Conference on Internet Computing & Information Services (ICICIS). Washington: IEEE Computer Society, 2011. 514–517Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.Department of Computer Science and Communication EngineeringJiangsu UniversityZhenjiangChina
  2. 2.School of Cyber EngineeringXidian UniversityXi’anChina

Personalised recommendations