Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data

被引:17
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [1 ]
Guan, Yunguo [1 ]
Shao, Jun [2 ]
Zhu, Hui [3 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[2] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Servers; Encryption; Cloud computing; Data models; Indexes; Privacy-preserving; exact set similarity search; Jaccard similarity; predicate encryption; B plus tree;
D O I
10.1109/TDSC.2020.3004442
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Set similarity search, aiming to search the similar sets to a query set, has wide application in today's recommendation services. Meanwhile, the rapid advance in cloud technique has promoted the boom of data outsourcing. However, since the cloud is not fully trustable and the data may be sensitive, data should be encrypted before outsourced to the cloud. Undoubtedly, data encryption will hinder some basic functionalities, e.g., set similarity search. For achieving set similarity search over encrypted data, many solutions were proposed, yet they either only satisfy weak security requirements, or only achieve approximate similarity, or have low efficiency or under the model of two cloud servers. Therefore, in this article, we propose a new efficient and privacy-preserving exact set similarity search scheme under a single cloud server. Specifically, we first design a symmetric-key predicate encryption (SPE-Sim) scheme, which can support similarity search over binary vectors. Then, we represent the set records to be binary vectors and employ the B+ tree to build an index for them. After that, based on SPE-Sim and the B+ tree-based index, we propose our scheme and it can achieve efficient set similarity search while preserving the privacy of set records and query contents. Finally, security analysis and performance evaluation indicate that our scheme is privacy-preserving and efficient.
引用
收藏
页码:1090 / 1103
页数:14
相关论文
共 50 条
  • [31] Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
    Yu, Chia-Mu
    Chen, Chi-Yuan
    Chao, Han-Chieh
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 385 - 394
  • [32] An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data
    Chen, Li
    Sun, Xingming
    Xia, Zhihua
    Liu, Qi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 323 - 332
  • [33] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [34] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [35] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [36] Efficient and Privacy-preserving Online Face Recognition over Encrypted Outsourced Data
    Yang, Xiaopeng
    Zhu, Hui
    Lu, Rongxing
    Liu, Ximeng
    Li, Hui
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 366 - 373
  • [37] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [38] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [39] Privacy preserving weighted similarity search scheme for encrypted data
    Guo, Cheng
    Tian, Pengxu
    Chang, Chin-Chen
    [J]. IET INFORMATION SECURITY, 2019, 13 (01) : 61 - 69
  • [40] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837