File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Secure kNN computation on encrypted databases

TitleSecure kNN computation on encrypted databases
Authors
KeywordsEncryption
KNN
Security
Issue Date2009
PublisherACM.
Citation
The 2009 International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS'09), Providence, RI., 29 June-2 July 2009. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09), 2009, p. 139-152 How to Cite?
AbstractService providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggressively recruit businesses to run applications on their platforms. To enforce security and privacy on such a service model, we need to protect the data running on the platform. Unfortunately, traditional encryption methods that aim at providing 'unbreakable' protection are often not adequate because they do not support the execution of applications such as database queries on the encrypted data. In this paper we discuss the general problem of secure computa- tion on an encrypted database and propose a SCONEDB (Secure Computation ON an Encrypted DataBase) model, which captures the execution and security requirements. As a case study, we focus on the problem of k-nearest neighbor (kNN) computation on an encrypted database. We develop a new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product. We use APSE to construct two secure schemes that support kNN computation on encrypted data; each of these schemes is shown to resist practical attacks of a different background knowledge level, at a different overhead cost. Extensive performance studies are carried out to evaluate the overhead and the efficiency of the schemes. © 2009 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/61181
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorWong, WKen_HK
dc.contributor.authorCheung, DWLen_HK
dc.contributor.authorKao, BCMen_HK
dc.contributor.authorMamoulis, Nen_HK
dc.date.accessioned2010-07-13T03:32:39Z-
dc.date.available2010-07-13T03:32:39Z-
dc.date.issued2009en_HK
dc.identifier.citationThe 2009 International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS'09), Providence, RI., 29 June-2 July 2009. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09), 2009, p. 139-152en_HK
dc.identifier.isbn978-1-60558-551-2-
dc.identifier.urihttp://hdl.handle.net/10722/61181-
dc.description.abstractService providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggressively recruit businesses to run applications on their platforms. To enforce security and privacy on such a service model, we need to protect the data running on the platform. Unfortunately, traditional encryption methods that aim at providing 'unbreakable' protection are often not adequate because they do not support the execution of applications such as database queries on the encrypted data. In this paper we discuss the general problem of secure computa- tion on an encrypted database and propose a SCONEDB (Secure Computation ON an Encrypted DataBase) model, which captures the execution and security requirements. As a case study, we focus on the problem of k-nearest neighbor (kNN) computation on an encrypted database. We develop a new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product. We use APSE to construct two secure schemes that support kNN computation on encrypted data; each of these schemes is shown to resist practical attacks of a different background knowledge level, at a different overhead cost. Extensive performance studies are carried out to evaluate the overhead and the efficiency of the schemes. © 2009 ACM.en_HK
dc.languageengen_HK
dc.publisherACM.-
dc.relation.ispartofProceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD'09)en_HK
dc.subjectEncryptionen_HK
dc.subjectKNNen_HK
dc.subjectSecurityen_HK
dc.titleSecure kNN computation on encrypted databasesen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailWong, WK: wkwong2@cs.hku.hken_HK
dc.identifier.emailCheung, DWL: dcheung@cs.hku.hken_HK
dc.identifier.emailKao, BCM: kao@cs.hku.hken_HK
dc.identifier.emailMamoulis, N: nikos@cs.hku.hk-
dc.identifier.authorityCheung, DWL=rp00101en_HK
dc.identifier.authorityKao, BCM=rp00123en_HK
dc.identifier.authorityMamoulis, N=rp00155en_HK
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1145/1559845.1559862en_HK
dc.identifier.scopuseid_2-s2.0-70849131456en_HK
dc.identifier.hkuros158809en_HK
dc.identifier.hkuros166356-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-70849131456&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage139en_HK
dc.identifier.epage152en_HK
dc.publisher.placeUnited States-
dc.identifier.scopusauthoridMamoulis, N=6701782749en_HK
dc.identifier.scopusauthoridKao, B=35221592600en_HK
dc.identifier.scopusauthoridCheung, DW=34567902600en_HK
dc.identifier.scopusauthoridWong, WK=8835876000en_HK
dc.identifier.citeulike5779855-
dc.customcontrol.immutablesml 140526-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats