Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ¼ÒÇÁÆ®¿þ¾î ¹× µ¥ÀÌÅÍ °øÇÐ
ÇѱÛÁ¦¸ñ(Korean Title) |
¾Æ¿ô¼Ò½Ì ¾ÏÈ£È µ¥ÀÌÅÍ¿¡ ´ëÇÑ È¿À²ÀûÀÎ Top-k ÁúÀÇ Ã³¸® ¾Ë°í¸®Áò |
¿µ¹®Á¦¸ñ(English Title) |
Outsourced-Data in the Cloud |
ÀúÀÚ(Author) |
±èÁ¾¿í
¼¿µ±Õ
Jong Wook Kim
Young-Kyoon Suh
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 04 NO. 12 PP. 0543 ~ 0548 (2015. 12) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù ´Ù¾çÇÑ ºÐ¾ß¿¡¼ »ý»êµÇ´Â µ¥ÀÌÅÍÀÇ ¾çÀÌ Æø¹ßÀûÀ¸·Î Áõ°¡ÇÔ¿¡ µû¶ó »ç¿ëÀÚ°¡ °¡Àå °ü½É ÀÖ¾î ÇÏ´Â ¸î °³ÀÇ µ¥ÀÌÅ͸¦ °Ë»öÇÏ´Â top-k ÁúÀÇ¿¡ ´ëÇÑ °ü½ÉÀÌ °íÁ¶µÇ°í ÀÖ´Ù. Top-k ÁúÀÇ´Â »ç¿ëÀÚÀÇ Á¡¼ö ÇÔ¼ö¸¦ ÀÌ¿ëÇÏ¿©, »ç¿ëÀÚ°¡ ¿øÇÏ´Â ¸ðµç Á¶°ÇÀ» ¸¸Á·½ÃÅ°´Â µ¥ÀÌÅ͵é Áß¿¡¼ ÃÖ»óÀ§ (¶Ç´Â ÃÖÇÏÀ§) Á¡¼ö¸¦ °¡Áö´Â k°³ÀÇ µ¥ÀÌÅ͸¦ »ç¿ëÀÚ¿¡°Ô ¹ÝȯÇÑ´Ù. ÃÖ±Ù µé¾î Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼ºñ½ºÀÇ ´ëÁßÈ·Î ÀÎÇÏ¿© »ç¿ëÀÚÀÇ ´ë¿ë·® µ¥ÀÌÅ͸¦ Ŭ¶ó¿ìµå¿¡ ¾Æ¿ô¼Ò½ÌÇÏ¿© °æÁ¦ÀûÀ¸·Î ÀúÀå ¹× °ü¸®ÇÏ´Â µ¥ÀÌÅÍ ¾Æ¿ô¼Ò½ÌÀÌ Å©°Ô ÁÖ¸ñ¹Þ°í ÀÖ´Ù. ±×·¯³ª µ¥ÀÌÅÍ ¾Æ¿ô¼Ò½ÌÀ¸·Î ÀÎÇÏ¿© »ç¿ëÀÚÀÇ ¹Î°¨ÇÑ µ¥ÀÌÅÍ°¡ Ŭ¶ó¿ìµå ¼ºñ½º Á¦°øÀÚ¿¡°Ô ³ëÃâµÉ ¼ö ÀÖ´Ù´Â À§ÇèÀÌ Á¸ÀçÇϸç, ÀÌ·¯ÇÑ ¹®Á¦¸¦ ¹æÁöÇϱâ À§Çؼ´Â »ç¿ëÀÚÀÇ ¹Î°¨ÇÑ µ¥ÀÌÅ͸¦ ¾ÏÈ£ÈÇÏ¿© Ŭ¶ó¿ìµå¿¡ ÀúÀåÇÏ´Â °ÍÀÌ ÇʼöÀûÀ¸·Î ¿ä±¸µÈ´Ù. º» ³í¹®Àº Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼ ¾ÏÈ£ÈµÈ µ¥ÀÌÅÍ¿¡ ´ëÇÑ top-k ÁúÀǸ¦ È¿À²ÀûÀ¸·Î ó¸®ÇÏ´Â ¾Ë°í¸®ÁòÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÇ´Â ¾Ë°í¸®ÁòÀº ¼ø¼º¸Á¸ ¾ÏÈ£È ±â¹ýÀ» ÀÌ¿ëÇÏ¿©, ¾ÏÈ£ÈµÈ µ¥ÀÌÅ͸¸À» ´ë»óÀ¸·Î top-k ÁúÀÇ °á°ú¿¡ Æ÷ÇÔµÇÁö ¾ÊÀ» °ÍÀ¸·Î ¿¹»óµÇ´Â Áß°£ °á°úµéÀ» Ŭ¶ó¿ìµå ³»¿¡¼ ¹Ì¸® Á¦°ÅÇÔÀ¸·Î½á È¿À²ÀûÀÎ top-k ÁúÀÇ Ã³¸®°¡ °¡´ÉÇÏ°Ô ÇÑ´Ù. ³í¹®ÀÇ ½ÇÇè °á°ú´Â Á¦¾ÈµÈ top-k ÁúÀÇ Ã³¸® ¾Ë°í¸®ÁòÀÌ ´Ü¼ø ¹æ¹ý°ú ºñ±³ÇÏ¿© »ç¿ëÀÚ ½Ã½ºÅÛÀÇ ºÎÇϸ¦ 10¹è¢¦10000¹è ÁÙÀÏ ¼ö ÀÖÀ½À» Áõ¸íÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently top-k query processing has been extremely important along with the explosion of data produced by a variety of applications. Top-k queries return the best k results ordered by a user-provided monotone scoring function. As cloud computing service has been getting more popular than ever, a hot attention has been paid to cloud-based data outsourcing in which clients' data are stored and managed by the cloud. The cloud-based data outsourcing, though, exposes a critical secuity concern of sensitive data, resulting in the misuse of unauthorized users. Hence it is essential to encrypt sensitive data before outsourcing the data to the cloud. However, there has been little attention to efficient top-k processing on the encrypted cloud data. In this paper we propose a novel top-k processing algorithm that can efficiently process a large amount of encrypted data in the cloud. The main idea of the algorithm is to prune unpromising intermediate results at the early phase without decrypting the encrypted data by leveraging an order-preserving encrypted technique. Experiment results show that the proposed top-k processing algorithm significantly reduces the overhead of client systems from 10X to 10000X. |
Å°¿öµå(Keyword) |
Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ
¾ÏÈ£È
Top-k ÁúÀÇ
Cloud Computing
Encryption
Top-k Query
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|