Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data

@article{Zhu2014SecurityAO,
  title={Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data},
  author={Youwen Zhu and Tsuyoshi Takagi and Rong Hu},
  journal={IEICE Transactions},
  year={2014},
  volume={97-D},
  pages={326-330}
}
Recently, Yuan et al. (IEEE Infocom ’13, pp.2652–2660) proposed an efficient secure nearest neighbor (SNN) search scheme on encrypted cloud database. Their scheme is claimed to be secure against the collusion attack of query clients and cloud server, because the colluding attackers cannot infer the encryption/decryption key. In this letter, we observe that the encrypted dataset in Yuan’s scheme can be broken by the collusion attack without deducing the key, and present a simple but powerful… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Efficient privacy-preserving biometric identification in cloud computing

2013 Proceedings IEEE INFOCOM • 2013
View 10 Excerpts
Highly Influenced

Order-Preserving Symmetric Encryption

IACR Cryptology ePrint Archive • 2009
View 5 Excerpts
Highly Influenced

Secure nearest neighbor revisited

2013 IEEE 29th International Conference on Data Engineering (ICDE) • 2013

Dynamic searchable symmetric encryption

ACM Conference on Computer and Communications Security • 2012
View 1 Excerpt

Outsourced Similarity Search on Metric Data Assets

IEEE Transactions on Knowledge and Data Engineering • 2012
View 3 Excerpts

Similar Papers

Loading similar papers…