{"title":"基于 BALL-PB 树的加密数据内积 KNN 安全查询","authors":"Huijie Liu, Jinsheng Xing","doi":"10.1016/j.csi.2024.103901","DOIUrl":null,"url":null,"abstract":"<div><p>With the increased data volume, data query service outsourcing to cloud servers is widely used. However, enabling authorized users to access confidential data is critical when conducting queries on untrusted cloud servers. To this end, an inner-product k-nearest neighbor (KNN) query scheme with access control (IPKNN_AC) is proposed under privacy protection. Firstly, this scheme utilizes the designed Ball-PB tree structure to partition the dataset into multiple subsets. Considering the efficiency and confidentiality of inner-product queries on the tree, the scheme represents the internal nodes and leaf nodes accordingly and defines a secure inner-product calculation protocol, EncInp. Secondly, relying on EncInp, a query algorithm is employed to perform similarity inner-product queries on the encrypted tree representation. Finally, the scheme is shown to be secure through security proofs of homomorphic encryption. Experimental evaluation results on medical datasets demonstrate the effectiveness of the scheme.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103901"},"PeriodicalIF":4.1000,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000709/pdfft?md5=c8c4923f65a97b115b4f3323d577d702&pid=1-s2.0-S0920548924000709-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Encrypted data inner product KNN secure query based on BALL-PB tree\",\"authors\":\"Huijie Liu, Jinsheng Xing\",\"doi\":\"10.1016/j.csi.2024.103901\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>With the increased data volume, data query service outsourcing to cloud servers is widely used. However, enabling authorized users to access confidential data is critical when conducting queries on untrusted cloud servers. To this end, an inner-product k-nearest neighbor (KNN) query scheme with access control (IPKNN_AC) is proposed under privacy protection. Firstly, this scheme utilizes the designed Ball-PB tree structure to partition the dataset into multiple subsets. Considering the efficiency and confidentiality of inner-product queries on the tree, the scheme represents the internal nodes and leaf nodes accordingly and defines a secure inner-product calculation protocol, EncInp. Secondly, relying on EncInp, a query algorithm is employed to perform similarity inner-product queries on the encrypted tree representation. Finally, the scheme is shown to be secure through security proofs of homomorphic encryption. Experimental evaluation results on medical datasets demonstrate the effectiveness of the scheme.</p></div>\",\"PeriodicalId\":50635,\"journal\":{\"name\":\"Computer Standards & Interfaces\",\"volume\":\"92 \",\"pages\":\"Article 103901\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2024-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S0920548924000709/pdfft?md5=c8c4923f65a97b115b4f3323d577d702&pid=1-s2.0-S0920548924000709-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Standards & Interfaces\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0920548924000709\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Standards & Interfaces","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0920548924000709","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
摘要
随着数据量的增加,外包给云服务器的数据查询服务得到了广泛应用。然而,在不受信任的云服务器上进行查询时,授权用户访问机密数据至关重要。为此,我们提出了一种具有访问控制功能的内积 k 近邻(KNN)查询方案(IPKNN_AC)。首先,该方案利用设计的 Ball-PB 树结构将数据集划分为多个子集。考虑到树上内积查询的效率和保密性,该方案相应地表示了内部节点和叶子节点,并定义了一个安全的内积计算协议 EncInp。其次,依靠 EncInp,采用一种查询算法对加密树表示执行相似性内积查询。最后,通过同态加密的安全证明,证明了该方案的安全性。医疗数据集的实验评估结果证明了该方案的有效性。
Encrypted data inner product KNN secure query based on BALL-PB tree
With the increased data volume, data query service outsourcing to cloud servers is widely used. However, enabling authorized users to access confidential data is critical when conducting queries on untrusted cloud servers. To this end, an inner-product k-nearest neighbor (KNN) query scheme with access control (IPKNN_AC) is proposed under privacy protection. Firstly, this scheme utilizes the designed Ball-PB tree structure to partition the dataset into multiple subsets. Considering the efficiency and confidentiality of inner-product queries on the tree, the scheme represents the internal nodes and leaf nodes accordingly and defines a secure inner-product calculation protocol, EncInp. Secondly, relying on EncInp, a query algorithm is employed to perform similarity inner-product queries on the encrypted tree representation. Finally, the scheme is shown to be secure through security proofs of homomorphic encryption. Experimental evaluation results on medical datasets demonstrate the effectiveness of the scheme.
期刊介绍:
The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking.
Computer Standards & Interfaces is an international journal dealing specifically with these topics.
The journal
• Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels
• Publishes critical comments on standards and standards activities
• Disseminates user''s experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods
• Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts
• Stimulates relevant research by providing a specialised refereed medium.