ABSTRACT
Distributed systems provide users with powerful capabilities to store and process their data in third-party machines. However, the privacy of the outsourced data is not guaranteed. One solution for protecting the user data against privacy attacks is to encrypt the sensitive data before sending to the nodes of the distributed system. Then, the main problem is to evaluate user queries over the encrypted data.
In this paper, we propose a complete solution for processing top-k queries over encrypted databases stored across the nodes of a distributed system. The problem of distributed top-k query processing has been well addressed over plaintext (non encrypted) data. However, the proposed approaches cannot be used in the case of encrypted data.
- P. Cao and Z. Wang. Efficient top-k query calculation in distributed networks. In PODC Conf., pages 206--215, 2004. Google ScholarDigital Library
- Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security (ACNS), pages 442--455, 2005. Google ScholarDigital Library
- S. Choi, G. Ghinita, H. Lim, and E. Bertino. Secure knn query processing in untrusted cloud environments. IEEE TKDE, 26(11):2818--2831, 2014.Google ScholarCross Ref
- X. Ding, P. Liu, and H. Jin. Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE TDSC, (99):1--14, 2017.Google Scholar
- Y. Elmehdwi, B. K. Samanthula, and W. Jiang. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proc. of IEEE ICDE, pages 664--675, 2014.Google ScholarCross Ref
- R. Fagin, A. Lotem, and M. Naor. Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci., 66(4):614--656, 2003. Google ScholarDigital Library
- C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169--178, 2009. Google ScholarDigital Library
- B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. VLDB J., 21(3):333--358, 2012. Google ScholarDigital Library
- B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB Conf., pages 720--731, 2004. Google ScholarDigital Library
- H. Kim, H. Kim, and J. Chang. A privacy-preserving top-k query processing algorithm in the cloud computing. In GECON, pages 277--292, 2017.Google ScholarCross Ref
- R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar. Fast range query processing with strong privacy protection for cloud computing. PVLDB, 7(14):1953--1964, 2014. Google ScholarDigital Library
- X. Liao and J. Li. Privacy-preserving and secure top-k query in two-tier wireless sensor network. In Global Communications Conference (GLOBECOM), pages 335--341, 2012.Google Scholar
- J. Pilourdault, V. Leroy, and S. Amer-Yahia. Distributed evaluation of top-k temporal joins. In SIGMOD Conf., pages 1027--1039, 2016. Google ScholarDigital Library
- R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: processing queries on an encrypted database. Commun. ACM, 55(9):103--111, 2012. Google ScholarDigital Library
- C. Sahin, T. Allard, R. Akbarinia, A. E. Abbadi, and E. Pacitti. A differentially private index for range query processing in clouds. In ICDE Conf., 2018.Google ScholarCross Ref
- J. Shi, D. Wu, and N. Mamoulis. Top-k relevant semantic place retrieval on spatial RDF data. In SIGMOD Conf., pages 1977--1990, 2016. Google ScholarDigital Library
- D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44--55, 2000. Google ScholarDigital Library
- J. Vaidya and C. Clifton. Privacy-preserving top-k queries. In Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pages 545--546. IEEE, 2005. Google ScholarDigital Library
- X. Wang, Y. Zhang, W. Zhang, X. Lin, and Z. Huang. SKYPE: top-k spatial-keyword publish/subscribe over sliding window. PVLDB, 9(7):588--599, 2016. Google ScholarDigital Library
- W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In SIGMOD Conf., pages 139--152, 2009. Google ScholarDigital Library
- H. Z. Xianrui Meng and G. Kollios. Top-k query processing on encrypted databases with strong security guarantees. In ICDE Conf., 2018.Google Scholar
- H. Yang, C. Chung, and M. H. Kim. An efficient top-k query processing framework in mobile sensor networks. Data Knowl. Eng., 102:78--95, 2016. Google ScholarDigital Library
- X. Zhang, G. Li, and J. Feng. Crowdsourced top-k algorithms: An experimental evaluation. PVLDB, 9(8):612--623, 2016. Google ScholarDigital Library
Index Terms
- Top-k Query Processing over Distributed Sensitive Data
Recommendations
Answering Top-k Queries over Outsourced Sensitive Data in the Cloud
Database and Expert Systems ApplicationsAbstractThe cloud provides users and companies with powerful capabilities to store and process their data in third-party data centers. However, the privacy of the outsourced data is not guaranteed by the cloud providers. One solution for protecting the ...
Privacy-Preserving Top-k Query Processing in Distributed Systems
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIAbstractWe consider a distributed system that stores user sensitive data across multiple nodes. In this context, we address the problem of privacy-preserving top-k query processing. We propose a novel system, called SD-TOPK, which is able to evaluate top-...
Uncertain top-k query processing in distributed environments
The top-k query on uncertain data set has been a very hot topic these years, and there have been many studies on uncertain top-k queries. Unfortunately, most of the existing algorithms only consider centralized processing environments, and they are not ...
Comments