Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data

被引:0
|
作者
Wang, Cong [1 ]
Ren, Kui [1 ]
Yu, Shucheng [2 ]
Urs, Karthik Mahendra Raje [1 ]
机构
[1] IIT, Dept ECE, Chicago, IL 60616 USA
[2] Univ Arkansas, Dept Comp Sci, Little Rock, AR 72204 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the data produced by individuals and enterprises that need to be stored and utilized are rapidly increasing, data owners are motivated to outsource their local complex data management systems into the cloud for its great flexibility and economic savings. However, as sensitive cloud data may have to be encrypted before outsourcing, which obsoletes the traditional data utilization service based on plaintext keyword search, how to enable privacy-assured utilization mechanisms for outsourced cloud data is thus of paramount importance. Considering the large number of on-demand data users and huge amount of outsourced data files in cloud, the problem is particularly challenging, as it is extremely difficult to meet also the practical requirements of performance, system usability, and high-level user searching experiences. In this paper, we investigate the problem of secure and efficient similarity search over outsourced cloud data. Similarity search is a fundamental and powerful tool widely used in plaintext information retrieval, but has not been quite explored in the encrypted data domain. Our mechanism design first exploits a suppressing technique to build storage-efficient similarity keyword set from a given document collection, with edit distance as the similarity metric. Based on that, we then build a private trie-traverse searching index, and show it correctly achieves the defined similarity search functionality with constant search time complexity. We formally prove the privacy-preserving guarantee of the proposed mechanism under rigorous security treatment. To demonstrate the generality of our mechanism and further enrich the application spectrum, we also show our new construction naturally supports fuzzy search, a previously studied notion aiming only to tolerate typos and representation inconsistencies in the user searching input. The extensive experiments on Amazon cloud platform with real data set further demonstrate the validity and practicality of the proposed mechanism.
引用
收藏
页码:451 / 459
页数:9
相关论文
共 50 条
  • [1] Practical and Privacy-assured Data Indexes for Outsourced Cloud Data
    Zhang, Hongli
    Zhou, Zhigang
    Du, Xiaojiang
    Li, Panpan
    Yu, Xiangzhan
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 671 - 676
  • [2] Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud
    Zhang, Yingguang
    Su, Sen
    Chen, Weifeng
    Wang, Yulong
    Xu, Peng
    Yang, Fangchun
    [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 398 - 403
  • [3] Privacy-assured substructure similarity query over encrypted graph-structured data in cloud
    Zhang, Yingguang
    Su, Sen
    Wang, Yulong
    Chen, Weifeng
    Yang, Fangchun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1933 - 1944
  • [4] Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    Cui, Zongmin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (10): : 5171 - 5189
  • [5] Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
    Yu, Chia-Mu
    Chen, Chi-Yuan
    Chao, Han-Chieh
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 385 - 394
  • [6] Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records
    Yuan, Xingliang
    Cui, Helei
    Wang, Xinyu
    Wang, Cong
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 40 - 60
  • [7] Toward Privacy-Assured and Searchable Cloud Data Storage Services
    Li, Ming
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    Hou, Y. Thomas
    [J]. IEEE NETWORK, 2013, 27 (04): : 56 - 62
  • [8] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    Teng Yiping
    Cheng Xiang
    Su Sen
    Wang Yulong
    Shuang Kai
    [J]. CHINA COMMUNICATIONS, 2015, 12 (12) : 109 - 121
  • [9] Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data
    TENG Yiping
    CHENG Xiang
    SU Sen
    WANG Yulong
    SHUANG Kai
    [J]. China Communications, 2015, 12 (12) : 109 - 121
  • [10] Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
    Wang, Cong
    Zhang, Bingsheng
    Ren, Kui
    Roveda, Janet M.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (01) : 166 - 177