TY - GEN
T1 - A Probabilistic Approach for Secure and Verifiable Computation of kNN Queries in Cloud
AU - Sundarapandi, Gowri Pandian
AU - Bokhary, Salma
AU - Samanthula, Bharath K.
AU - Dong, Boxiang
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - The tremendous benefits of outsourcing have influenced many organizations to migrate their data and DBMS functionalities to the cloud infrastructure. Since cloud service providers offer advanced security services, data migration typically boosts the security of business data and operations. Nonetheless, since a cloud is an untrusted third party, it is important for organizations to ensure confidentiality of the outsourced data and integrity of results generated by the cloud. In this paper, we focus on the Secure and Verifiable Computation for k-Nearest Neighbor (SVC-kNN) problem. Existing SVC-kNN solutions delegate the verification task solely to a single semi-trusted party and are unreliable in terms of security as the verification server could be either dishonest or compromised. To address these issues, we propose a novel and probabilistic SVC-kNN protocol that utilizes a randomization technique and additive homomorphic properties under the two-cloud model. Our proposed solution facilitates the clouds to jointly compute verification proofs and allows the end-user to verify the computation results efficiently. Additionally, our solution is highly efficient from the data owner and query issuers' perspective as most of the critical computations are performed by the clouds. Furthermore, our experimental results using a real dataset clearly demonstrate the effectiveness of our protocol.
AB - The tremendous benefits of outsourcing have influenced many organizations to migrate their data and DBMS functionalities to the cloud infrastructure. Since cloud service providers offer advanced security services, data migration typically boosts the security of business data and operations. Nonetheless, since a cloud is an untrusted third party, it is important for organizations to ensure confidentiality of the outsourced data and integrity of results generated by the cloud. In this paper, we focus on the Secure and Verifiable Computation for k-Nearest Neighbor (SVC-kNN) problem. Existing SVC-kNN solutions delegate the verification task solely to a single semi-trusted party and are unreliable in terms of security as the verification server could be either dishonest or compromised. To address these issues, we propose a novel and probabilistic SVC-kNN protocol that utilizes a randomization technique and additive homomorphic properties under the two-cloud model. Our proposed solution facilitates the clouds to jointly compute verification proofs and allows the end-user to verify the computation results efficiently. Additionally, our solution is highly efficient from the data owner and query issuers' perspective as most of the critical computations are performed by the clouds. Furthermore, our experimental results using a real dataset clearly demonstrate the effectiveness of our protocol.
KW - Cloud computing
KW - homomorphic encryption
KW - k-nearest neighbor
KW - privacy
KW - verifiable computation
UR - http://www.scopus.com/inward/record.url?scp=85169464343&partnerID=8YFLogxK
U2 - 10.1109/CloudSummit57601.2023.00009
DO - 10.1109/CloudSummit57601.2023.00009
M3 - Conference contribution
AN - SCOPUS:85169464343
T3 - Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023
SP - 15
EP - 20
BT - Proceedings - 2023 IEEE Cloud Summit, Cloud Summit 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 IEEE Cloud Summit, Cloud Summit 2023
Y2 - 6 July 2023 through 7 July 2023
ER -