A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases

  • Hyeong Jin Kim
  • , Jae Woo Chang*
  • *Corresponding author for this work

    Research output: Contribution to journalReview articlepeer-review

    Abstract

    With the growth of cloud computing, database outsourcing has attracted a lot of interest. Due to the serious privacy threats in cloud computing, databases need to be encrypted before being outsourced to the cloud. Therefore, various Top-k query processing algorithms have been studied for encrypted databases. However, existing algorithms are either insecure or inefficient. Therefore, in this paper we propose a new Top-k query processing algorithm that guarantees confidentiality of both data and user queries while hiding data access patterns. Our algorithm also allows the query issuer to not participate in the query processing. To achieve a high query processing efficiency, we implement new secure protocols using Yao’s garbled circuit and a data packing technique. A performance analysis shows that the proposed algorithm outperforms the existing work in terms of query processing costs.

    Original languageEnglish
    Pages (from-to)898-904
    Number of pages7
    JournalInternational Journal of System Assurance Engineering and Management
    Volume10
    Issue number5
    DOIs
    StatePublished - 2019.10.1

    Keywords

    • Database encryption
    • Database outsourcing
    • Encrypted index
    • Hiding data access patterns
    • Secure Top-k query processing

    Quacquarelli Symonds(QS) Subject Topics

    • Business & Management Studies
    • Engineering - Petroleum

    Fingerprint

    Dive into the research topics of 'A new Top-k query processing algorithm to guarantee confidentiality of data and user queries on outsourced databases'. Together they form a unique fingerprint.

    Cite this