Secure kNN Query Processing in Untrusted Cloud Environments

2014 ◽  
Vol 26 (11) ◽  
pp. 2818-2831 ◽  
Author(s):  
Sunoh Choi ◽  
Gabriel Ghinita ◽  
Hyo-Sang Lim ◽  
Elisa Bertino
2019 ◽  
Vol 13 (2) ◽  
pp. 14-31
Author(s):  
Mamdouh Alenezi ◽  
Muhammad Usama ◽  
Khaled Almustafa ◽  
Waheed Iqbal ◽  
Muhammad Ali Raza ◽  
...  

NoSQL-based databases are attractive to store and manage big data mainly due to high scalability and data modeling flexibility. However, security in NoSQL-based databases is weak which raises concerns for users. Specifically, security of data at rest is a high concern for the users deployed their NoSQL-based solutions on the cloud because unauthorized access to the servers will expose the data easily. There have been some efforts to enable encryption for data at rest for NoSQL databases. However, existing solutions do not support secure query processing, and data communication over the Internet and performance of the proposed solutions are also not good. In this article, the authors address NoSQL data at rest security concern by introducing a system which is capable to dynamically encrypt/decrypt data, support secure query processing, and seamlessly integrate with any NoSQL- based database. The proposed solution is based on a combination of chaotic encryption and Order Preserving Encryption (OPE). The experimental evaluation showed excellent results when integrated the solution with MongoDB and compared with the state-of-the-art existing work.


Author(s):  
Ricardo J. Barrientos ◽  
Javier A. Riquelme ◽  
Ruber Hernández-García ◽  
Cristóbal A. Navarro ◽  
Wladimir Soto-Silva
Keyword(s):  

Author(s):  
Ricardo J. Barrientos ◽  
José I. Gómez ◽  
Christian Tenllado ◽  
Manuel Prieto Matias ◽  
Mauricio Marin

2008 ◽  
Author(s):  
Yang Lu ◽  
Bin Cui ◽  
Jiakui Zhao ◽  
Hua Lu ◽  
Jialie Shen

2012 ◽  
Vol 17 (5) ◽  
pp. 973-985 ◽  
Author(s):  
Thao P. Nghiem ◽  
Agustinus Borgy Waluyo ◽  
David Taniar

2008 ◽  
Vol 20 (12) ◽  
pp. 1655-1668 ◽  
Author(s):  
Shan-Hung Wu ◽  
Kun-Ta Chuang ◽  
Chung-Min Chen ◽  
Ming-Syan Chen

2014 ◽  
Vol 10 (4) ◽  
pp. 385-405 ◽  
Author(s):  
Yuka Komai ◽  
Yuya Sasaki ◽  
Takahiro Hara ◽  
Shojiro Nishio

In a kNN query processing method, it is important to appropriately estimate the range that includes kNNs. While the range could be estimated based on the node density in the entire network, it is not always appropriate because the density of nodes in the network is not uniform. In this paper, we propose two kNN query processing methods in MANETs where the density of nodes is ununiform; the One-Hop (OH) method and the Query Log (QL) method. In the OH method, the nearest node from the point specified by the query acquires its neighbors' location and then determines the size of a circle region (the estimated kNN circle) which includes kNNs with high probability. In the QL method, a node which relays a reply of a kNN query stores the information on the query result for future queries.


Author(s):  
Changqing Ji ◽  
Tingting Dong ◽  
Yu Li ◽  
Yanming Shen ◽  
Keqiu Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document