Secure Approximate Nearest Neighbor Search over Encrypted Data

被引:3
作者
Gao, Yaqian [1 ]
Miao, Meixia [2 ]
Wang, Jianfeng [1 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] Xian Int Univ, Sch Entrepreneurship, Xian, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA) | 2014年
关键词
Approximate nearest neighbor; Privacy-preserving; Locality sensitive hashing; Order-preserving encryption;
D O I
10.1109/BWCCA.2014.118
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For the past decade, approximate nearest neighbor (ANN) search in high dimensional space has been studied extensively. However, it supports only ANN search over palintext in traditional locality sensitive hashing (LSH). How to perform ANN search over encrypted data becomes a new challenging task. In this paper, we make an attempt to formally address the problem. We propose a new secure and efficient ANN search scheme over encrypted data based on SortingKeys-LSH (LSH) and mutable order-preserving encryption (mOPE). In our construction, we exploit SK-LSH to generate indexes locally. While data and indexes should be outsourced to the cloud in encrypted form, which complicates computations on the encrypted data. Then, we encrypt LSH indexes using mOPE for efficient ANN search. Through rigorous security and efficiency analysis, we show that our proposed scheme is secure under the proposed model, while correctly realizing the goal of secure ANN search over encrypted data.
引用
收藏
页码:578 / 583
页数:6
相关论文
共 17 条
[1]  
Agrawal R., 2004, SIGMOD C
[2]  
[Anonymous], 2007, P 33 INT C VER LARG
[3]  
[Anonymous], 2010, 2010 IEEE International Symposium on Parallel Distributed Processing (IPDPS), DOI DOI 10.1109/INFCOM.2010.5462196
[4]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[5]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[6]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[7]  
Dae Hyun Yum, 2012, Information Security Applications. 12th International Workshop, WISA 2011. Revised Selected Papers, P84, DOI 10.1007/978-3-642-27890-7_7
[8]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[9]  
Gan Junhao, 2012, P 2012 ACM SIGMOD IN, P541
[10]  
Indyk P., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P604, DOI 10.1145/276698.276876