Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing

被引:9
|
作者
Ibrahim, Ayad [1 ,2 ]
Jin, Hai [1 ]
Yassin, Ali A. [1 ,2 ]
Zou, Deqing [1 ]
Xu, Peng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
[2] Basrah Univ, Coll Educ, Dept Comp Sci, Basrah 61004, Iraq
来源
COMPUTER JOURNAL | 2014年 / 57卷 / 02期
基金
美国国家科学基金会;
关键词
cloud computing; security; searchable encryption; approximate search; metric space; string embedding; SIMILARITY SEARCH; ENCRYPTION; SECURITY;
D O I
10.1093/comjnl/bxt045
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the great advances in cloud computing and Internet technologies, data owners (DOs) have been motivated to outsource the storage of their data to remote cloud servers (CSs) in order to enjoy great data management service with an efficient cost. For security purposes, DOs usually have to encrypt their data prior to outsourcing it to the untrusted CSs. But encryption makes searching the encrypted data a challenging task. Recently, several approaches have been provided to enable searching over encrypted data. However, the majority of these systems are limited to handling an exact search, not a similarity search; but the latter is an important need for real-world applications. In this paper, we propose an efficient yet secure scheme to search encrypted cloud data, while recovering the misspellings and typographical errors that exist frequently both in the search request and in the source data. To do so, we use a metric space to construct a tree-based index, which allows retrieving only the relevant entries with a minimum number of distance evaluations. String embedding techniques are used to refine the relevant entries efficiently and securely. Our index construction maintains the privacy of the keyword trapdoors as well as the stored data. Comparing our scheme with other similarity searchable encryption systems via experiments shows that our scheme is efficient in terms of search time and storage overhead.
引用
收藏
页码:241 / 254
页数:14
相关论文
共 50 条
  • [1] Towards efficient privacy-preserving encrypted image search in cloud computing
    Wang, Yuan
    Miao, Meixia
    Shen, Jian
    Wang, Jianfeng
    [J]. SOFT COMPUTING, 2019, 23 (06) : 2101 - 2112
  • [2] Towards efficient privacy-preserving encrypted image search in cloud computing
    Yuan Wang
    Meixia Miao
    Jian Shen
    Jianfeng Wang
    [J]. Soft Computing, 2019, 23 : 2101 - 2112
  • [3] Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    [J]. PROCEEDINGS OF THE 2014 ACM CONFERENCE ON MULTIMEDIA (MM'14), 2014, : 497 - 506
  • [4] Efficient Privacy-Preserving Biometric Identification in Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2652 - 2660
  • [5] Towards efficient privacy-preserving face recognition in the cloud
    Guo, Shangwei
    Xiang, Tao
    Li, Xiaoguo
    [J]. SIGNAL PROCESSING, 2019, 164 : 320 - 328
  • [6] POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing
    Hahn, Changhee
    Hur, Junbeom
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1826 - 1828
  • [7] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [8] Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing
    Xu, Chang
    Zhang, Lvhan
    Zhu, Liehuang
    Zhang, Chuan
    Sharif, Kashif
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 363 - 370
  • [9] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    [J]. IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [10] A privacy-preserving multi-keyword search approach in cloud computing
    Manasrah, Ahmed M.
    Abu Nasir, Mahmoud
    Salem, Maher
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5609 - 5631