Se SecE cEQP: A Se Secu cure e an and Ef Effici cient ent Sc Schem eme e for Sk SkNN Quer ery Pr Problem lem over er En Encr crypte ted d Geo eoda data ta on Cl Cloud Alex ex X. Liu
Professor, fessor, IEEE Fell llow
- w
Dept.
- t. of Comput
Alex ex X. Liu Professor, fessor, IEEE Fell llow ow Dept. t. - - PowerPoint PPT Presentation
Se SecE cEQP: A Se Secu cure e an and Ef Effici cient ent Sc Schem eme e for Sk SkNN Quer ery Pr Problem lem over er En Encr crypte ted d Geo eoda data ta on Cl Cloud Alex ex X. Liu Professor, fessor, IEEE Fell llow
Alex X. Liu
Alex X. Liu
Alex X. Liu
Alex X. Liu
Alex X. Liu
Public Cloud Data Owner Data User
Data
Data User
Query Results
Alex X. Liu
─ If p and q are plain text: trivial. ─ If p and q are encrypted: requires homomorphic encryption (extremely slow)
𝑞 ⌋, where g is the granularity.
⌋,k), …, HMAC(⌊𝑞𝑜 ⌋,k).
𝑟 ⌋,k).
Alex X. Liu
Alex X. Liu
റ 𝑞.𝑏 ⌋
Alex X. Liu
Alex X. Liu
Alex X. Liu
─ Degree between two vectors: 360/(2*d) ─ Equivalence: 𝑞1 ≡ 𝑞2 iff
─ Geometrically, equivalent class is a regular polygon with 2d edges. ─ The larger d is, the more closer the equivalent class is a circle. Alex X. Liu
Alex X. Liu
(ℎ𝑏1,𝑘 𝑟 =ℎ𝑏1,𝑘 𝑞𝑗 )∧ ( ℎ𝑏2,𝑘 𝑟 =ℎ𝑏2,𝑘 𝑞𝑗 ) ∧… ∧(ℎ𝑏𝑒,𝑘 𝑟 =ℎ𝑏𝑒,𝑘 𝑞𝑗 )
then add 𝑞𝑗 to result.
Alex X. Liu
(ℎ𝑏1,𝑘 𝑟 =ℎ𝑏1,𝑘 𝑞𝑗 )∧ ( ℎ𝑏2,𝑘 𝑟 =ℎ𝑏2,𝑘 𝑞𝑗 ) ∧… ∧(ℎ𝑏𝑒,𝑘 𝑟 =ℎ𝑏𝑒,𝑘 𝑞𝑗 ) ℎ𝑏1,𝑘 𝑟 |ℎ𝑏2,𝑘 𝑟 |…|ℎ𝑏𝑒,𝑘 𝑟 =ℎ𝑏1,𝑘 𝑞𝑗 |ℎ𝑏2,𝑘 𝑞𝑗 |…|ℎ𝑏𝑒,𝑘 𝑞𝑗 HMAC(ℎ𝑏1,𝑘 𝑟 | ℎ𝑏2,𝑘 𝑟 |…|ℎ𝑏𝑒,𝑘 𝑟 , 𝐿)= HMAC(ℎ𝑏1,𝑘 𝑞𝑗 |ℎ𝑏2,𝑘 𝑞𝑗 |…|ℎ𝑏𝑒,𝑘 𝑞𝑗 , , 𝐿)
HMAC(ℎ𝑏1,𝑘 𝑟 | ℎ𝑏2,𝑘 𝑟 |…|ℎ𝑏𝑒,𝑘 𝑟 , 𝐿)= HMAC(ℎ𝑏1,𝑘 𝑞𝑗 |ℎ𝑏2,𝑘 𝑞𝑗 |…|ℎ𝑏𝑒,𝑘 𝑞𝑗 , , 𝐿) Is HMAC(𝑘|ℎ𝑏1,𝑘 𝑟 | ℎ𝑏2,𝑘 𝑟 |…|ℎ𝑏𝑒,𝑘 𝑟 , 𝐿) in the set {HMAC(1|ℎ𝑏1,1 𝑞𝑗 |ℎ𝑏2,1 𝑞𝑗 |…|ℎ𝑏𝑒,1 𝑞𝑗 , , 𝐿), HMAC(2|ℎ𝑏1,2 𝑞𝑗 |ℎ𝑏2,2 𝑞𝑗 |…|ℎ𝑏𝑒,2 𝑞𝑗 , , 𝐿), …… HMAC(𝑛|ℎ𝑏1,𝑛 𝑞𝑗 |ℎ𝑏1,𝑛 𝑞𝑗 |…|ℎ𝑏𝑒,𝑛 𝑞𝑗 , , 𝐿)}
Alex X. Liu
Alex X. Liu
Alex X. Liu
Alex X. Liu
─ Cloud chooses two distinct sets D0 and D1, and sends to data owner.
─ Data owner randomly chooses D0 or D1
─ Repeats the following steps for a polynomial number of times
– The query has the same # of satisfying elements in D0 and D1.
pervious queries and query results ─ In the end, cloud guesses b=0/1 still with 50% probability.
─ Privacy is already expensive. We do not want absolute privacy.
Query latency by varying k Query latency by varying number of data items n Index size by varying the number of data items n
1 𝑙 𝛵ⅈ=1 𝑙 𝑝𝑗,𝑟 𝑝𝑗
∗,𝑟
∗ is the actual ith nearest
∗, 𝑟
𝑘, 𝑟
𝑘 ∗, 𝑟 .
Alex X. Liu
Alex X. Liu
OAR by varying dimension d (50NN) FEP by varying dimension d (50NN) OAR by requiring a larger k and figure
FEP by requiring a larger k and figure
Alex X. Liu
Missing rate by requiring a larger k and figure out top 50 nearest points for 50NN Redundancy rate by requiring a larger k and figure out top 50 nearest points for 50NN