Verifiable privacy-preserving semantic retrieval scheme in the edge computing

被引:0
|
作者
Guo, Jiaqi [1 ,2 ]
Tian, Cong [1 ,2 ]
He, Qiang [3 ,4 ]
Zhao, Liang [1 ,2 ]
Duan, Zhenhua [1 ,2 ]
机构
[1] Xidian Univ, ICTT Lab, Xian 710071, Peoples R China
[2] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
[3] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Secure semantic retrieval; Secure kNN based on LWE; Result verification; Edge computing; SEARCHABLE ENCRYPTION;
D O I
10.1016/j.sysarc.2024.103289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data outsourcing and retrieval. However, data outsourcing poses risks to data privacy. Although searchable encryption is proposed to secure search of outsourced data, existing schemes generally cannot meet the requirements of semantic search, and they also exhibit security risks and incur high search costs. In addition, edge servers may engage in malicious activities such as data tampering or forgery. Therefore, we propose a verifiable privacy-preserving semantic retrieval scheme named VPSR suitable for edge computing environments. We utilize the Doc2Vec method to extract text feature vectors and then convert them into matrix form to reduce storage space requirements for indexes, queries, and keys. We encrypt matrices using an improved secure k-nearest neighbor (kNN) algorithm based on learning with errors (LWE) and calculate text similarity by solving the Hadamard product between matrices. Additionally, we design an aggregable signature scheme and offload part of the result verification tasks to edge servers. Security and performance analysis results demonstrate that the VPSR scheme is suitable for edge computing environments with high encryption and search efficiency and low storage cost while ensuring security.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing
    Zhang, Shiwen
    Hu, Biao
    Liang, Wei
    Li, Kuan-Ching
    Gupta, Brij B.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9768 - 9781
  • [42] Federated learning-based privacy-preserving electricity load forecasting scheme in edge computing scenario
    Wang, Haolin
    Zhao, Yun
    He, Shan
    Xiao, Yong
    Tang, Jianlin
    Cai, Ziwen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (05)
  • [43] Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
    Zhang, Shuaipeng
    Liu, Hong
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 90 - 96
  • [44] Privacy-Preserving Asynchronous Federated Learning Mechanism for Edge Network Computing
    Lu, Xiaofeng
    Liao, Yuying
    Lio, Pietro
    Hui, Pan
    IEEE ACCESS, 2020, 8 : 48970 - 48981
  • [45] Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing
    Cheng, Hang
    Huang, Qinjian
    Chen, Fei
    Wang, Meiqing
    Yan, Wanxi
    IEEE ACCESS, 2022, 10 : 18570 - 18582
  • [46] Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing
    Hu, Yujia
    Shen, Hang
    Bai, Guangwei
    Wang, Tianjing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 431 - 446
  • [47] Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing
    Ma, Lichuan
    Liu, Xuefeng
    Pei, Qingqi
    Xiang, Yong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 786 - 799
  • [48] Privacy-Preserving and Low-Latency Federated Learning in Edge Computing
    He, Chunrong
    Liu, Guiyan
    Guo, Songtao
    Yang, Yuanyuan
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20): : 20149 - 20159
  • [49] Privacy-Preserving Live Video Analytics for Drones via Edge Computing
    Nagasubramaniam, Piyush
    Wu, Chen
    Sun, Yuanyi
    Karamchandani, Neeraj
    Zhu, Sencun
    He, Yongzhong
    APPLIED SCIENCES-BASEL, 2024, 14 (22):
  • [50] Privacy-preserving healthcare monitoring for IoT devices under edge computing
    Cao, Wei
    Shen, Wenting
    Zhang, Zhixiang
    Qin, Jing
    COMPUTERS & SECURITY, 2023, 134