O-Bin : Oblivious Binning for Encrypted Data over Cloud

被引:2
|
作者
Ahmad, Mahmood [1 ]
Pervez, Zeeshan [2 ]
Kang, Byeong Ho [3 ]
Lee, Sungyoung [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Univ West Scotland, Sch Comp, Paisley PA1 2BE, Renfrew, Scotland
[3] Univ Tasmania, Sch Comp & Informat Syst, Hobart, Tas 7001, Australia
关键词
Similarity discovery; Security and Privacy; Cloud; Binning;
D O I
10.1109/AINA.2015.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the data growth rate has been observed growing at a staggering rate. Considering data search as a primitive operation and to optimize this process on large volume of data, various solution have been evolved over a period of time. Other than finding the precise similarity, these algorithms aim to find the approximate similarities and arrange them into bins. Locality sensitive hashing (LSH) is one such algorithm that discovers probable similarities prior calculating the exact similarity thus enhance the overall search process in high dimensional search space. Realizing same strategy for encrypted data and that too in public cloud introduces few challenges to be resolved before probable similarity discovery. To address these issues and to formalize a similar strategy like LSH, in this paper we have formalized a technique O-Bin that is designed to work over encrypted data in cloud. By exploiting existing cryptographic primitives, O-Bin preserves the data privacy during the similarity discovery for the binning process. Our experimental evaluation for O-Bin produces results similar to LSH for encrypted data.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 50 条
  • [21] RESeED: Regular Expression Search over Encrypted Data in the Cloud
    Salehi, Mohsen Amini
    Caldwell, Thomas
    Fernandez, Alejandro
    Mickiewicz, Emmanuel
    Rozier, Eric W. D.
    Zonouz, Saman
    Redberg, David
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 673 - 680
  • [22] Secure Naive Bayesian Classification over Encrypted Data in Cloud
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 130 - 150
  • [23] Verifiable Search Over Updatable Encrypted Data in Cloud Computing
    Ocansey, Selasi Kwame
    Wang, Changda
    Ametepe, Wolali
    Xu, Qinbao
    Zeng, Yu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 156 - 161
  • [24] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [25] An effective comparison protocol over encrypted data in cloud computing
    Jiang, Leqi
    Cao, Yi
    Yuan, Chengsheng
    Sun, Xingming
    Zhu, Xiaoli
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [26] Secure and Efficient Image Retrieval over Encrypted Cloud Data
    Liang, Haihua
    Zhang, Xinpeng
    Cheng, Hang
    Wei, Qiuhan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] Efficient Semantic Search over Encrypted Data in Cloud Computing
    Moh, Teng-Sheng
    Ho, Kam Ho
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 382 - 390
  • [28] Preferred Keyword Search over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2013 IEEE/ACM 21ST INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2013, : 207 - 212
  • [29] A SURVEY OF MULTI KEYWORD SEARCH OVER THE ENCRYPTED DATA IN CLOUD
    Sathya, S.
    Gayathri, J.
    Radhika, D.
    IIOAB JOURNAL, 2016, 7 (09) : 600 - 607
  • [30] Privacy Preserving Keyword Search over Encrypted Cloud Data
    Ananthi, S.
    Sendil, M. Sadish
    Karthik, S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 480 - 487