O-Bin : Oblivious Binning for Encrypted Data over Cloud

被引:2
|
作者
Ahmad, Mahmood [1 ]
Pervez, Zeeshan [2 ]
Kang, Byeong Ho [3 ]
Lee, Sungyoung [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Univ West Scotland, Sch Comp, Paisley PA1 2BE, Renfrew, Scotland
[3] Univ Tasmania, Sch Comp & Informat Syst, Hobart, Tas 7001, Australia
关键词
Similarity discovery; Security and Privacy; Cloud; Binning;
D O I
10.1109/AINA.2015.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the data growth rate has been observed growing at a staggering rate. Considering data search as a primitive operation and to optimize this process on large volume of data, various solution have been evolved over a period of time. Other than finding the precise similarity, these algorithms aim to find the approximate similarities and arrange them into bins. Locality sensitive hashing (LSH) is one such algorithm that discovers probable similarities prior calculating the exact similarity thus enhance the overall search process in high dimensional search space. Realizing same strategy for encrypted data and that too in public cloud introduces few challenges to be resolved before probable similarity discovery. To address these issues and to formalize a similar strategy like LSH, in this paper we have formalized a technique O-Bin that is designed to work over encrypted data in cloud. By exploiting existing cryptographic primitives, O-Bin preserves the data privacy during the similarity discovery for the binning process. Our experimental evaluation for O-Bin produces results similar to LSH for encrypted data.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 50 条
  • [31] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [32] DOAS: Efficient data owner authorized search over encrypted cloud data
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Zhang, Junwei
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 349 - 360
  • [33] DOAS: Efficient data owner authorized search over encrypted cloud data
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Zhiquan Liu
    Junwei Zhang
    Fushan Wei
    Peer-to-Peer Networking and Applications, 2018, 11 : 349 - 360
  • [34] Order-Hiding Range Query Over Encrypted Cloud Data
    Kwon, Hyunsoo
    Hur, Junbeom
    Hahn, Changhee
    IEEE ACCESS, 2022, 10 : 75604 - 75618
  • [35] Semantic Keyword Search based on Trie over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Zhang, Daxing
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 59 - 62
  • [36] A Novel Fuzzy Keyword Retrieval Scheme over Encrypted Cloud Data
    TIAN Ke
    ZHANG Weiming
    LI Ke
    WU Junming
    YU Nenghai
    WuhanUniversityJournalofNaturalSciences, 2013, 18 (05) : 393 - 401
  • [37] Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
    Meng, Qian
    Ma, Jianfeng
    Chen, Kefei
    Miao, Yinbin
    Yang, Tengfei
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [38] DNA Similarity Search With Access Control Over Encrypted Cloud Data
    Xu, Guowen
    Li, Hongwei
    Ren, Hao
    Lin, Xiaodong
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1233 - 1252
  • [39] Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data
    Yang, Wei
    Geng, Yangyang
    Li, Lu
    Xie, Xike
    Huang, Liusheng
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (01) : 107 - 121
  • [40] Enabling verifiable multiple keywords search over encrypted cloud data
    Miao, Yinbin
    Weng, Jian
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liu, Zhiquan
    Li, Hongwei
    INFORMATION SCIENCES, 2018, 465 : 21 - 37