Efficient Secure and Verifiable Location-Based Skyline Queries over Encrypted Data

Supporting secure location-based services on encrypted data that is outsourced to cloud computing platforms remains an ongoing challenge for efficiency due to expensive ciphertext calculation overhead. Furthermore, since the clouds may not be trustworthy or even malicious, data security and result authenticity has caused huge concerns. Unfortunately, little work can enable query efficiency, dataset confidentiality and result authenticity to be commendably guaranteed. In this paper, we demonstrate the potential of supporting secure and verifiable location-based skyline queries (SVLSQ). First, we devise a novel and unified structure, named semi-blind R-tree (SR-tree), which protects the query unlinkability. Based on SR-tree, we propose an authenticated data structure, named secure and verifiable scope R-tree (SVSR-tree). Then, we develop several secure protocols based on SVSR-tree to accelerate the query efficiency and reduce the size of verification objects. Our method avoids compromising the privacy of datasets, queries, results and access patterns. Meanwhile, it authenticates the soundness and completeness of the skyline results while preserving privacy. Finally, we analyze the complexity and security of SVLSQ. Findings from the performance evaluation illustrate that SVLSQ is a dramatically efficient method in terms of query (no less than 3 orders of magnitude faster than other solutions) and verification.

[1]  Xuemin Lin,et al.  Continuous monitoring of moving skyline and top-k queries , 2021, The VLDB Journal.

[2]  Xiangjian He,et al.  Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data , 2021, IEEE Transactions on Dependable and Secure Computing.

[3]  Ximeng Liu,et al.  CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud , 2020, Inf. Sci..

[4]  Jianxin Li,et al.  SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform* , 2020, 2020 IEEE 36th International Conference on Data Engineering (ICDE).

[5]  Cyrus Shahabi,et al.  Secure Dynamic Skyline Queries Using Result Materialization , 2020, 2021 IEEE 37th International Conference on Data Engineering (ICDE).

[6]  Jiangtao Cui,et al.  SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud , 2020, DASFAA.

[7]  Guoliang Li,et al.  ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).

[8]  Ximeng Liu,et al.  CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query , 2019, IEEE Internet of Things Journal.

[9]  Jianliang Xu,et al.  vChain: Enabling Verifiable Boolean Range Queries over Blockchain Databases , 2018, SIGMOD Conference.

[10]  Robert H. Deng,et al.  PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[11]  Jian Pei,et al.  Secure and Efficient Skyline Queries on Encrypted Data , 2018, IEEE Transactions on Knowledge and Data Engineering.

[12]  Jae-Woo Chang,et al.  A secure kNN query processing algorithm using homomorphic encryption on outsourced database , 2017, Data Knowl. Eng..

[13]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..

[14]  Jian Pei,et al.  Secure Skyline Queries on Cloud Platform , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).

[15]  David J. Wu,et al.  Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..

[16]  Jianfeng Ma,et al.  Efficient and privacy-preserving skyline computation framework across domains , 2016, Future Gener. Comput. Syst..

[17]  Rui Zhang,et al.  Secure outsourced skyline query processing via untrusted cloud service providers , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[18]  David J. Wu,et al.  Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.

[19]  Lu Li,et al.  Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[20]  Elisa Bertino,et al.  Secure kNN Query Processing in Untrusted Cloud Environments , 2014, IEEE Transactions on Knowledge and Data Engineering.

[21]  Jianliang Xu,et al.  Authenticating Top-k Queries in Location-based Services with Confidentiality , 2013, Proc. VLDB Endow..

[22]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[23]  Nickolai Zeldovich,et al.  An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.

[24]  Muhammad Aamir Cheema,et al.  A safe zone based approach for monitoring moving skyline queries , 2013, EDBT '13.

[25]  Gabriel Ghinita,et al.  Authenticating spatial skyline queries with low communication overhead , 2013, CODASPY.

[26]  Elaine Shi,et al.  Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.

[27]  Ling Ren,et al.  Path ORAM , 2012, J. ACM.

[28]  Jianliang Xu,et al.  Authentication of location-based skyline queries , 2011, CIKM '11.

[29]  Man Lung Yiu,et al.  Authentication of moving kNN queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[30]  Stavros Papadopoulos,et al.  Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..

[31]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[32]  Yin Yang,et al.  Authenticated indexing for outsourced spatial databases , 2009, The VLDB Journal.

[33]  Ken C. K. Lee,et al.  Location-Dependent Skyline Query , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[34]  Bernhard Seeger,et al.  Efficient Computation of Reverse Skyline Queries , 2007, VLDB.

[35]  Anthony K. H. Tung,et al.  Continuous Skyline Queries for Moving Objects , 2006, IEEE Transactions on Knowledge and Data Engineering.

[36]  Cyrus Shahabi,et al.  The spatial skyline queries , 2006, VLDB.

[37]  Bernhard Seeger,et al.  Progressive skyline computation in database systems , 2005, TODS.

[38]  Jan Chomicki,et al.  Skyline with presorting , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[39]  Donald Kossmann,et al.  Shooting Stars in the Sky: An Online Algorithm for Skyline Queries , 2002, VLDB.

[40]  Donald Kossmann,et al.  The Skyline operator , 2001, Proceedings 17th International Conference on Data Engineering.

[41]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[42]  Antonin Guttman,et al.  R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.

[43]  Murat Kantarcioglu,et al.  Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.

[44]  Mark de Berg,et al.  Computational geometry: algorithms and applications , 1997 .