skip to main content
10.1145/3216122.3216153acmotherconferencesArticle/Chapter ViewAbstractPublication PagesideasConference Proceedingsconference-collections
research-article

Top-k Query Processing over Distributed Sensitive Data

Published:18 June 2018Publication History

ABSTRACT

Distributed systems provide users with powerful capabilities to store and process their data in third-party machines. However, the privacy of the outsourced data is not guaranteed. One solution for protecting the user data against privacy attacks is to encrypt the sensitive data before sending to the nodes of the distributed system. Then, the main problem is to evaluate user queries over the encrypted data.

In this paper, we propose a complete solution for processing top-k queries over encrypted databases stored across the nodes of a distributed system. The problem of distributed top-k query processing has been well addressed over plaintext (non encrypted) data. However, the proposed approaches cannot be used in the case of encrypted data.

References

  1. P. Cao and Z. Wang. Efficient top-k query calculation in distributed networks. In PODC Conf., pages 206--215, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security (ACNS), pages 442--455, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Choi, G. Ghinita, H. Lim, and E. Bertino. Secure knn query processing in untrusted cloud environments. IEEE TKDE, 26(11):2818--2831, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  4. X. Ding, P. Liu, and H. Jin. Privacy-preserving multi-keyword top-k similarity search over encrypted data. IEEE TDSC, (99):1--14, 2017.Google ScholarGoogle Scholar
  5. Y. Elmehdwi, B. K. Samanthula, and W. Jiang. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proc. of IEEE ICDE, pages 664--675, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Fagin, A. Lotem, and M. Naor. Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci., 66(4):614--656, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169--178, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. VLDB J., 21(3):333--358, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB Conf., pages 720--731, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Kim, H. Kim, and J. Chang. A privacy-preserving top-k query processing algorithm in the cloud computing. In GECON, pages 277--292, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar. Fast range query processing with strong privacy protection for cloud computing. PVLDB, 7(14):1953--1964, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. X. Liao and J. Li. Privacy-preserving and secure top-k query in two-tier wireless sensor network. In Global Communications Conference (GLOBECOM), pages 335--341, 2012.Google ScholarGoogle Scholar
  13. J. Pilourdault, V. Leroy, and S. Amer-Yahia. Distributed evaluation of top-k temporal joins. In SIGMOD Conf., pages 1027--1039, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: processing queries on an encrypted database. Commun. ACM, 55(9):103--111, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Sahin, T. Allard, R. Akbarinia, A. E. Abbadi, and E. Pacitti. A differentially private index for range query processing in clouds. In ICDE Conf., 2018.Google ScholarGoogle ScholarCross RefCross Ref
  16. J. Shi, D. Wu, and N. Mamoulis. Top-k relevant semantic place retrieval on spatial RDF data. In SIGMOD Conf., pages 1977--1990, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44--55, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Vaidya and C. Clifton. Privacy-preserving top-k queries. In Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pages 545--546. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Wang, Y. Zhang, W. Zhang, X. Lin, and Z. Huang. SKYPE: top-k spatial-keyword publish/subscribe over sliding window. PVLDB, 9(7):588--599, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In SIGMOD Conf., pages 139--152, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Z. Xianrui Meng and G. Kollios. Top-k query processing on encrypted databases with strong security guarantees. In ICDE Conf., 2018.Google ScholarGoogle Scholar
  22. H. Yang, C. Chung, and M. H. Kim. An efficient top-k query processing framework in mobile sensor networks. Data Knowl. Eng., 102:78--95, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. X. Zhang, G. Li, and J. Feng. Crowdsourced top-k algorithms: An experimental evaluation. PVLDB, 9(8):612--623, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Top-k Query Processing over Distributed Sensitive Data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IDEAS '18: Proceedings of the 22nd International Database Engineering & Applications Symposium
      June 2018
      328 pages
      ISBN:9781450365277
      DOI:10.1145/3216122

      Copyright © 2018 ACM

      © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate74of210submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader