Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data

被引:17
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [1 ]
Guan, Yunguo [1 ]
Shao, Jun [2 ]
Zhu, Hui [3 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[2] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Servers; Encryption; Cloud computing; Data models; Indexes; Privacy-preserving; exact set similarity search; Jaccard similarity; predicate encryption; B plus tree;
D O I
10.1109/TDSC.2020.3004442
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Set similarity search, aiming to search the similar sets to a query set, has wide application in today's recommendation services. Meanwhile, the rapid advance in cloud technique has promoted the boom of data outsourcing. However, since the cloud is not fully trustable and the data may be sensitive, data should be encrypted before outsourced to the cloud. Undoubtedly, data encryption will hinder some basic functionalities, e.g., set similarity search. For achieving set similarity search over encrypted data, many solutions were proposed, yet they either only satisfy weak security requirements, or only achieve approximate similarity, or have low efficiency or under the model of two cloud servers. Therefore, in this article, we propose a new efficient and privacy-preserving exact set similarity search scheme under a single cloud server. Specifically, we first design a symmetric-key predicate encryption (SPE-Sim) scheme, which can support similarity search over binary vectors. Then, we represent the set records to be binary vectors and employ the B+ tree to build an index for them. After that, based on SPE-Sim and the B+ tree-based index, we propose our scheme and it can achieve efficient set similarity search while preserving the privacy of set records and query contents. Finally, security analysis and performance evaluation indicate that our scheme is privacy-preserving and efficient.
引用
收藏
页码:1090 / 1103
页数:14
相关论文
共 50 条
  • [1] Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2604 - 2618
  • [2] EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 524 - 536
  • [3] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [4] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [5] Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing
    Song, Fuyuan
    Qin, Zheng
    Xue, Liang
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6184 - 6198
  • [6] A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings
    Aritomo, Daisuke
    Watanabe, Chiemi
    Matsubara, Masaki
    Morishima, Atsuyuki
    [J]. IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2019, : 403 - 412
  • [7] PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2030 - 2045
  • [8] Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2501 - 2516
  • [9] Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Shao, Jun
    Zhu, Hui
    [J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21 (06) : 5479 - 5492
  • [10] Privacy-preserving and Efficient Multi-keyword Search Over Encrypted Data on Blockchain
    Jiang, Shan
    Cao, Jiannong
    McCannt, Julie A.
    Yang, Yanni
    Liu, Yang
    Wang, Xiaoqing
    Deng, Yuming
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 405 - 410