Processing private queries over untrusted data cloud through privacy homomorphism
- 1 April 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Query processing that preserves both the data privacy of the owner and the query privacy of the client is a new research problem. It shows increasing importance as cloud computing drives more businesses to outsource their data and querying services. However, most existing studies, including those on data outsourcing, address the data privacy and query privacy separately and cannot be applied to this problem. In this paper, we propose a holistic and efficient solution that comprises a secure traversal framework and an encryption scheme based on privacy homomorphism. The framework is scalable to large datasets by leveraging an index-based approach. Based on this framework, we devise secure protocols for processing typical queries such as k-nearest-neighbor queries (kNN) on R-tree index. Moreover, several optimization techniques are presented to improve the efficiency of the query processing protocols. Our solution is verified by both theoretical analysis and performance study.Keywords
This publication has 21 references indexed in Scilit:
- Outsourcing Search Services on Private Spatial DataInternational Conference on Data Engineering, 2009
- Non-Exposure Location AnonymityInternational Conference on Data Engineering, 2009
- Private queries in location based servicesPublished by Association for Computing Machinery (ACM) ,2008
- Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key CryptosystemsEURASIP Journal on Embedded Systems, 2008
- Preserving data privacy in outsourcing data aggregation servicesACM Transactions on Internet Technology, 2007
- PRIVEPublished by Association for Computing Machinery (ACM) ,2007
- Location Privacy in Mobile Systems: A Personalized Anonymization ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Distance browsing in spatial databasesACM Transactions on Database Systems, 1999