Advertisement

Privacy-Preserving Top-k Query Processing in Distributed Systems

  • Sakina Mahboubi
  • Reza Akbarinia
  • Patrick Valduriez
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11014)

Abstract

We consider a distributed system that stores user sensitive data across multiple nodes. In this context, we address the problem of privacy-preserving top-k query processing. We propose a novel system, called SD-TOPK, that is able to evaluate top-k queries over encrypted distributed data without needing to decrypt the data in the nodes where they are stored. We implemented and evaluated our system over synthetic and real databases. The results show excellent performance for SD-TOPK compared to baseline approaches.

Notes

Acknowledgement

The research leading to these results has received funding from the European Union’s Horizon 2020 - The EU Framework Programme for Research and Innovation 2014–2020, under grant agreement No. 732051.

References

  1. 1.
    Cao, P., Wang, Z.: Efficient top-k query calculation in distributed networks. In: Proceedings of ACM PODC, pp. 206–215 (2004)Google Scholar
  2. 2.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005).  https://doi.org/10.1007/11496137_30CrossRefGoogle Scholar
  3. 3.
    Choi, S., Ghinita, G., Lim, H.-S., Bertino, E.: Secure kNN query processing in untrusted cloud environments. IEEE TKDE 26(11), 2818–2831 (2014)Google Scholar
  4. 4.
    Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE TDSC 99, 1–14 (2017)Google Scholar
  5. 5.
    Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceedings of IEEE ICDE, pp. 664–675 (2014)Google Scholar
  6. 6.
    Fagin, R., Lotem, A., Naor, M.: Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci. 66(4), 614–656 (2003)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. J. VLDB 21(3), 333–358 (2012)CrossRefGoogle Scholar
  8. 8.
    Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB, pp. 720–731 (2004)Google Scholar
  9. 9.
    Kim, H.-I., Kim, H.-J., Chang, J.-W.: A privacy-preserving top-k query processing algorithm in the cloud computing. In: Bañares, J.Á., Tserpes, K., Altmann, J. (eds.) GECON 2016. LNCS, vol. 10382, pp. 277–292. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-61920-0_20CrossRefGoogle Scholar
  10. 10.
    Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. In: PVLDB, vol. 7, no. 14, pp. 1953–1964 (2014)CrossRefGoogle Scholar
  11. 11.
    Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Global Communications Conference (GLOBECOM), pp. 335–341 (2012)Google Scholar
  12. 12.
    Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRefGoogle Scholar
  13. 13.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S&P, pp. 44–55 (2000)Google Scholar
  14. 14.
    Vaidya, J., Clifton, C.: Privacy-preserving top-k queries. In: 21st International Conference on Data Engineering. ICDE 2005, pp. 545–546 (2005)Google Scholar
  15. 15.
    Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: ACM SIGMOD, pp. 139–152 (2009)Google Scholar
  16. 16.
    Zhu, H., Meng, X., Kollios, G.: Top-k query processing on encrypted databases with strong security guarantees. arXiv:1510.05175v2 (2016)

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sakina Mahboubi
    • 1
  • Reza Akbarinia
    • 1
  • Patrick Valduriez
    • 1
  1. 1.INRIA & LIRMM, University of MontpellierMontpellierFrance

Personalised recommendations