Secure and Efficient ${K}$ Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem

Uncertain data pervades many fields, including environmental monitoring, the monitoring of animal migrations, and urban warfare. Such uncertain data collected by field devices, such as Internet of Things (IoT) and Internet of Battlefield Things (IoBT) devices, may also be encrypted and outsourced to an untrustworthy third party for storage and data sharing such as a cloud server. However, the properties of uncertain data and the complication of operating over encrypted data make the searching schemes more ineffective. In this article, we design an efficient and safe ${K}$ nearest neighbor (KNN) query scheme for uncertain data stored in semi-trusted cloud servers. We apply the modified homomorphic encryption, which requires two servers to interact and encrypt the uncertain data, and we use the authorized rank method to compute KNN. We protect the security of the data while simultaneously improving the query efficiency. Our detailed security analysis show that our scheme can realize the goal of concealing both the access and the search patterns. Comprehensive experiments are conducted to demonstrate the scheme’s performance.

[1]  Laks V. S. Lakshmanan,et al.  ProbView: a flexible probabilistic database system , 1997, TODS.

[2]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[3]  Hector Garcia-Molina,et al.  The Management of Probabilistic Data , 1992, IEEE Trans. Knowl. Data Eng..

[4]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[5]  Xue Chen,et al.  Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption , 2020, IEEE Transactions on Services Computing.

[6]  Sunil Prabhakar,et al.  Evaluating probabilistic queries over imprecise data , 2003, SIGMOD '03.

[7]  Jianliang Xu,et al.  Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[8]  Mohamed A. Soliman,et al.  Top-k Query Processing in Uncertain Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[9]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[10]  Xuemin Lin,et al.  Efficient rank based KNN query processing over uncertain data , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[11]  Cong Wang,et al.  Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[12]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[13]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[14]  Xiang Lian,et al.  Probabilistic Group Nearest Neighbor Queries in Uncertain Databases , 2008, IEEE Transactions on Knowledge and Data Engineering.

[15]  Kim-Kwang Raymond Choo,et al.  Secure Range Search Over Encrypted Uncertain IoT Outsourced Data , 2019, IEEE Internet of Things Journal.

[16]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[17]  Stanley B. Zdonik,et al.  Top-k queries on uncertain data: on score distribution and typical answers , 2009, SIGMOD Conference.

[18]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[19]  Moshe Shaked,et al.  Stochastic orders and their applications , 1994 .

[20]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[21]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[22]  Cheng Guo,et al.  Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).

[23]  Xi Zhang,et al.  Semantics and evaluation of top-k queries in probabilistic databases , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.

[24]  Feifei Li,et al.  Semantics of Ranking Queries for Probabilistic Data and Expected Ranks , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[25]  Hao Chen,et al.  Efficient privacy-preserving circular range search on outsourced spatial data , 2016, 2016 IEEE International Conference on Communications (ICC).

[26]  Jian Pei,et al.  Ranking queries on uncertain data: a probabilistic threshold approach , 2008, SIGMOD Conference.

[27]  Sunil Prabhakar,et al.  Querying imprecise data in moving object environments , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).