TY - GEN
T1 - Privacy-preserving k-nearest neighbour query on outsourced database
AU - Xu, Rui
AU - Morozov, Kirill
AU - Yang, Yanjiang
AU - Zhou, Jianying
AU - Takagi, Tsuyoshi
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016
Y1 - 2016
N2 - Cloud computing brought a shift from the traditional clientserver model to DataBase as a Service (DBaaS), where the data owner outsources her database as well as the data management function to the cloud service provider. Although cloud services relieve the clients from the data management burdens, a significant concern about the data privacy remains. In this work, we focus on privacy-preserving k-nearest neighbour (k-NN) query, and provide the first sublinear solution (with preprocessing) with computational complexity Õ (klog4n) in the honestbut- curious adversarial setting. Our constructions use the data structure called kd-tree to achieve sublinear query complexity. In order to protect data access patterns, garbled circuits are used to simulate Oblivious RAM (ORAM) for accessing data in the kd-tree. Compared to the existing solutions, our scheme imposes little overhead on both the data owner and the querying client.
AB - Cloud computing brought a shift from the traditional clientserver model to DataBase as a Service (DBaaS), where the data owner outsources her database as well as the data management function to the cloud service provider. Although cloud services relieve the clients from the data management burdens, a significant concern about the data privacy remains. In this work, we focus on privacy-preserving k-nearest neighbour (k-NN) query, and provide the first sublinear solution (with preprocessing) with computational complexity Õ (klog4n) in the honestbut- curious adversarial setting. Our constructions use the data structure called kd-tree to achieve sublinear query complexity. In order to protect data access patterns, garbled circuits are used to simulate Oblivious RAM (ORAM) for accessing data in the kd-tree. Compared to the existing solutions, our scheme imposes little overhead on both the data owner and the querying client.
UR - http://www.scopus.com/inward/record.url?scp=84978200144&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84978200144&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-40253-6_11
DO - 10.1007/978-3-319-40253-6_11
M3 - Conference contribution
AN - SCOPUS:84978200144
SN - 9783319402529
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 181
EP - 197
BT - Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
A2 - Liu, Joseph K.
A2 - Steinfeld, Ron
PB - Springer Verlag
T2 - 21st Australasian Conference on Information Security and Privacy, ACISP 2016
Y2 - 4 July 2016 through 6 July 2016
ER -