File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1559845.1559862
- Scopus: eid_2-s2.0-70849131456
Conference Paper: Secure kNN computation on encrypted databases
Title | Secure kNN computation on encrypted databases |
---|---|
Authors | |
Keywords | Encryption KNN Security |
Issue Date | 2009 |
Publisher | ACM. |
Citation | The 2009 International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS'09), Providence, RI., 29 June-2 July 2009. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09), 2009, p. 139-152 How to Cite? |
Abstract | Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggressively recruit businesses to run applications on their platforms. To enforce security and privacy on such a service model, we need to protect the data running on the platform. Unfortunately, traditional encryption methods that aim at providing 'unbreakable' protection are often not adequate because they do not support the execution of applications such as database queries on the encrypted data. In this paper we discuss the general problem of secure computa- tion on an encrypted database and propose a SCONEDB (Secure Computation ON an Encrypted DataBase) model, which captures the execution and security requirements. As a case study, we focus on the problem of k-nearest neighbor (kNN) computation on an encrypted database. We develop a new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product. We use APSE to construct two secure schemes that support kNN computation on encrypted data; each of these schemes is shown to resist practical attacks of a different background knowledge level, at a different overhead cost. Extensive performance studies are carried out to evaluate the overhead and the efficiency of the schemes. © 2009 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/61181 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wong, WK | en_HK |
dc.contributor.author | Cheung, DWL | en_HK |
dc.contributor.author | Kao, BCM | en_HK |
dc.contributor.author | Mamoulis, N | en_HK |
dc.date.accessioned | 2010-07-13T03:32:39Z | - |
dc.date.available | 2010-07-13T03:32:39Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | The 2009 International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS'09), Providence, RI., 29 June-2 July 2009. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09), 2009, p. 139-152 | en_HK |
dc.identifier.isbn | 978-1-60558-551-2 | - |
dc.identifier.uri | http://hdl.handle.net/10722/61181 | - |
dc.description.abstract | Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggressively recruit businesses to run applications on their platforms. To enforce security and privacy on such a service model, we need to protect the data running on the platform. Unfortunately, traditional encryption methods that aim at providing 'unbreakable' protection are often not adequate because they do not support the execution of applications such as database queries on the encrypted data. In this paper we discuss the general problem of secure computa- tion on an encrypted database and propose a SCONEDB (Secure Computation ON an Encrypted DataBase) model, which captures the execution and security requirements. As a case study, we focus on the problem of k-nearest neighbor (kNN) computation on an encrypted database. We develop a new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product. We use APSE to construct two secure schemes that support kNN computation on encrypted data; each of these schemes is shown to resist practical attacks of a different background knowledge level, at a different overhead cost. Extensive performance studies are carried out to evaluate the overhead and the efficiency of the schemes. © 2009 ACM. | en_HK |
dc.language | eng | en_HK |
dc.publisher | ACM. | - |
dc.relation.ispartof | Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09) | en_HK |
dc.subject | Encryption | en_HK |
dc.subject | KNN | en_HK |
dc.subject | Security | en_HK |
dc.title | Secure kNN computation on encrypted databases | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Wong, WK: wkwong2@cs.hku.hk | en_HK |
dc.identifier.email | Cheung, DWL: dcheung@cs.hku.hk | en_HK |
dc.identifier.email | Kao, BCM: kao@cs.hku.hk | en_HK |
dc.identifier.email | Mamoulis, N: nikos@cs.hku.hk | - |
dc.identifier.authority | Cheung, DWL=rp00101 | en_HK |
dc.identifier.authority | Kao, BCM=rp00123 | en_HK |
dc.identifier.authority | Mamoulis, N=rp00155 | en_HK |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.doi | 10.1145/1559845.1559862 | en_HK |
dc.identifier.scopus | eid_2-s2.0-70849131456 | en_HK |
dc.identifier.hkuros | 158809 | en_HK |
dc.identifier.hkuros | 166356 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-70849131456&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 139 | en_HK |
dc.identifier.epage | 152 | en_HK |
dc.publisher.place | United States | - |
dc.identifier.scopusauthorid | Mamoulis, N=6701782749 | en_HK |
dc.identifier.scopusauthorid | Kao, B=35221592600 | en_HK |
dc.identifier.scopusauthorid | Cheung, DW=34567902600 | en_HK |
dc.identifier.scopusauthorid | Wong, WK=8835876000 | en_HK |
dc.identifier.citeulike | 5779855 | - |
dc.customcontrol.immutable | sml 140526 | - |