Skip to main content

Abstract

With the increased demand for outsourcing databases, there is a demand to enable secure and efficient communications. The concern regarding outsourcing data is mainly providing confidentiality and integrity to the data. This paper proposes a novel solution to answering kNN queries at the cloud server over encrypted data. Data owners transform their data from a native domain to a new domain to assist in nearest neighbors’ classification. The transformation is achieved by the Voronoi diagram, which transforms the data space into numerous small regions, simplifying the nearest neighbor search. However, because the regions that make up a Voronoi diagram are irregularly shaped, the search through the network becomes hard to accomplish.

Thus, the solution includes a Grid-based indexing approach for the Voronoi diagram to expedite the kNN search. Additionally, a strong encryption algorithm, like AES, is used to encrypt the data objects being sent from the data owner to the cloud. The cloud service provider utilizes the proposed indexing scheme to identify a superset of the nearest neighboring objects to be sent back to the user. An authorized user wants to send encrypted kNN queries to the cloud where the query is processed over encrypted data. However, the user should not have a copy of the encryption key. Therefore, Trusted Party or a Trusted Machine (Query Proxy) was added that handles the encryption and decryption of the communication between the user and the service provider.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anurag, Arora, D., Kumar, U.: Implications of privacy-preserving K-means clustering over outsourced data on the cloud platform. J. Theor. Appl. Inf. Technol. 96(12), 3937–3950 (2018)

    Google Scholar 

  2. Real spatial datasets. http://www.cs.fsu.edu/lifeifei/SpatialDataset.htm

  3. Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. ACM Trans. Database Syst. 34(4) (2009). https://doi.org/10.1145/1620585.1620591

  4. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management Data, pp. 139–152 (2009)

    Google Scholar 

  5. Zhu, Y., Xu, R., Takagi, T.: Secure k-NN computation on encrypted cloud data without sharing the key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 55–60 (2013). https://doi.org/10.1145/2484402.2484415

  6. Zhu, Y., Huang, Z., Takagi, T.: Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 89, 1–12 (2016). https://doi.org/10.1016/j.jpdc.2015.11.004

    Article  Google Scholar 

  7. Lian, H., Qiu, W., Yan, D., Guo, J., Li, Z., Tang, P.: Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Comput. Secur. 96 (2020). https://doi.org/10.1016/j.cose.2020.101845

  8. Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333–358 (2012). https://doi.org/10.1007/s00778-011-0245-7

    Article  Google Scholar 

  9. Said, P., Sciences, C., Said, P.: Privacy preserving location-based services query scheme based on fully homomorphic, vol. 99, no. 16, pp. 4098–4121 (2021)

    Google Scholar 

  10. Peng, T., Liu, Q., Wang, G., Xiang, Y., Chen, S.: Multidimensional privacy preservation in location-based services. Future Gener. Comput. Syst. 93, 312–326 (2019). https://doi.org/10.1016/j.future.2018.10.025

    Article  Google Scholar 

  11. Talha, A.M., Kamel, I.: Secure k NN queries over outsourced spatial data for location-based services, pp. 123–126 (2016)

    Google Scholar 

  12. Li, L., Jiang, X., Zhu, F., Liu, A.: Efficient privacy-preserving skyline queries over outsourced cloud. In: Web Information Systems Engineering, pp. 83–97 (2020)

    Google Scholar 

  13. Hong, J., Wen, T., Guo, Q., Ye, Z.: Secure kNN computation and integrity assurance of data outsourcing in the cloud. Math. Probl. Eng. 2017 (2017). https://doi.org/10.1155/2017/8109730

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Eva Habeeb , Abdullah Al Amodi Ibrahim Kamel or Zaher Al Aghbari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Habeeb, E., Kamel, A.A.A.I., Al Aghbari, Z. (2022). Privacy-Preserving kNN Spatial Query Using Voronoi Diagram. In: Abraham, A., et al. Proceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021). SoCPaR 2021. Lecture Notes in Networks and Systems, vol 417. Springer, Cham. https://doi.org/10.1007/978-3-030-96302-6_10

Download citation

Publish with us

Policies and ethics