Secure Top-k Inner Product Retrieval

被引:12
|
作者
Zhang, Zhilin [1 ]
Wang, Ke [1 ]
Lin, Chen [2 ]
Lin, Weipeng [1 ]
机构
[1] Simon Fraser Univ, Burnaby, BC, Canada
[2] Xiamen Univ, Xiamen, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
Top-k Retrieval; Inner Product Encryption; Known Plaintext Attack; COMPUTATION;
D O I
10.1145/3269206.3271791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure top-k inner product retrieval allows the users to outsource encrypted data vectors to a cloud server and at some later time find the k vectors producing largest inner products giving an encrypted query vector. Existing solutions suffer poor performance raised by the client's filtering out top-k results. To enable the server-side filtering, we introduce an asymmetric inner product encryption AIPE that allows the server to compute inner products from encrypted data and query vectors. To solve AIPE's vulnerability under known plaintext attack, we present a packing approach IP Packing that allows the server to obtain the entire set of inner products between the query and all data vectors but prevents the server from associating any data vector with its inner product. Based on IP Packing, we present our solution SKIP to secure top-k inner product retrieval that further speeds up retrieval process using sequential scan. Experiments on real recommendation datasets demonstrate that our protocols outperform alternatives by several orders of magnitude.
引用
收藏
页码:77 / 86
页数:10
相关论文
共 50 条
  • [21] Faster Top-k Document Retrieval in Optimal Space
    Navarro, Gonzalo
    Thankachan, Sharma V.
    STRING PROCESSING AND INFORMATION RETRIEVAL (SPIRE 2013), 2013, 8214 : 255 - 262
  • [22] Evaluating refined queries in top-k retrieval systems
    Chakrabarti, K
    Ortega-Binderberger, M
    Mehrotra, S
    Porkaew, K
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (02) : 256 - 270
  • [23] Efficient Retrieval of Top-k Weighted Spatial Triangles
    Taniguchi, Ryosuke
    Amagata, Daichi
    Hara, Takahiro
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 224 - 231
  • [24] TIME-OPTIMAL TOP-k DOCUMENT RETRIEVAL
    Navarro, Gonzalo
    Nekrich, Yakov
    SIAM JOURNAL ON COMPUTING, 2017, 46 (01) : 80 - 113
  • [25] Efficient and Secure Top-k Queries With Top Order-Preserving Encryption
    Quan, Hanyu
    Wang, Boyang
    Zhang, Yuqing
    Wu, Gaofei
    IEEE ACCESS, 2018, 6 : 31525 - 31540
  • [26] Top-k Query for Weighted Interactive Product Configuration
    Chen, Baijun
    Feng, Tao
    2018 17TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES), 2018, : 326 - 331
  • [27] Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud
    Powers, James
    Chen, Keke
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 155 - 162
  • [28] Secure Top-k Query Scheme in Wireless Sensor Networks
    Xiao, Yunpeng
    Zhang, Yaru
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 516 - 519
  • [29] Optimizing Top-k Retrieval: Submodularity Analysis and Search Strategies
    Sha, Chaofeng
    Wang, Keqiang
    Zhang, Dell
    Wang, Xiaoling
    Zhou, Aoying
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 18 - 29
  • [30] Optimizing top-k retrieval:submodularity analysis and search strategies
    Chaofeng SHA
    Keqiang WANG
    Dell ZHANG
    Xiaoling WANG
    Aoying ZHOU
    Frontiers of Computer Science, 2016, 10 (03) : 477 - 487