Answering Top-k Queries over Outsourced Sensitive Data in the Cloud
- 649 Downloads
The cloud provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the user data is to encrypt it before sending to the cloud. Then, the main problem is to evaluate user queries over the encrypted data.
In this paper, we consider the problem of answering top-k queries over encrypted data. We propose a novel system, called BuckTop, designed to encrypt and outsource the user sensitive data to the cloud. BuckTop comes with a top-k query processing algorithm that is able to process efficiently top-k queries over the encrypted data, without decrypting the data in the cloud data centers.
We implemented BuckTop and compared its performance for processing top-k queries over encrypted data with that of the popular threshold algorithm (TA) over original (plaintext) data. The results show the effectiveness of BuckTop for outsourcing sensitive data in the cloud and answering top-k queries.
KeywordsCloud Sensitive data Top-k query
The research leading to these results has received funding from the European Union’s Horizon 2020 - The EU Framework Programme for Research and Innovation 2014–2020, under grant agreement No. 732051.
- 1.Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: SIGMOD Conference, pp. 563–574 (2004)Google Scholar
- 3.Choi, S., Ghinita, G., Lim, H.-S., Bertino, E.: Secure kNN query processing in untrusted cloud environments. In: IEEE TKDE, pp. 2818–2831 (2014)Google Scholar
- 4.Coles, C., Yeoh, J.: Cloud adoption practices and priorities survey report. Technical report, Cloud Security Alliance report, January 2015Google Scholar
- 5.Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-k similarity search over encrypted data. In: IEEE TDSC no. 99, pp. 1–14 (2017)Google Scholar
- 6.Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: ICDE Conference (2014)Google Scholar
- 10.Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: VLDB Conference, pp. 720–731 (2004)Google Scholar
- 11.Islam, M.S., Kuzu, M., Kantarcioglu, M.: Inference attack against encrypted range queries on outsourced databases. In: ACM CODASPY, pp. 235–246 (2014)Google Scholar
- 13.Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. PVLDB 7(14), 1953–1964 (2014)Google Scholar
- 14.Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: Global Communications Conference (GLOBECOM), pp. 335–341 (2012)Google Scholar
- 15.Mahboubi, S., Akbarinia, R., Valduriez, P.: Top-k query processing over outsourced encrypted data. Research report RR-9053, INRIA (2017)Google Scholar
- 16.Sahin, C., Allard, T., Akbarinia, R., El Abbadi, A., Pacitti, E.: A differentially private index for range query processing in clouds. In: ICDE Conference (2018)Google Scholar
- 17.Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S&P, pp. 44–55 (2000)Google Scholar
- 18.Vaidya, J., Clifton, C.: Privacy-preserving top-k queries. In: ICDE Conference, pp. 545–546 (2005)Google Scholar
- 19.Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD Conference, pp. 139–152 (2009)Google Scholar
- 20.Zhu, H., Meng, X., Kollios, G.: Top-k query processing on encrypted databases with strong security guarantees. In: ICDE Conference (2018)Google Scholar