Lightweight Privacy-Preserving Similar Documents Retrieval over Encrypted Data

被引:3
|
作者
Abduljabbar, Zaid Ameen [1 ,2 ]
Ibrahim, Ayad [3 ]
Al Sibahee, Mustafa A. [4 ,5 ]
Lu, Songfeng [6 ,7 ]
Umran, Samir M. [6 ]
机构
[1] Univ Basrah, Coll Educ Pure Sci, Basrah, Iraq
[2] Al Kunooze Univ Coll, Tech Comp Engn Dept, Basrah, Iraq
[3] Univ Basrah, Coll Educ Pure Sci, Comp Sci Dept, Basrah, Iraq
[4] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen, Peoples R China
[5] Iraq Univ Coll, Basrah, Iraq
[6] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Hubei Engn Res Ctr Big Data Secur, Wuhan, Peoples R China
[7] Univ Sci & Technol, Shenzhen Inst Huazhong, Shenzhen, Peoples R China
来源
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021) | 2021年
关键词
privacy-preserving DSD; secure inverted index; fingerprint set; Paillier cryptosystem; PLAGIARISM DETECTION;
D O I
10.1109/COMPSAC51774.2021.00202
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Document Similarity Detection (DSD) is significant in our real life applications. However, the existing methods ignore the privacy of what is contained in the documents uploaded on remote servers, thus reducing the applicability of these methods. The proposed scheme allows documents to be compared without revealing to those remote servers. For each document, the fingerprint set is calculated. The inverted index is constructed on the basis of the whole fingerprint set. The inverted index is widely used for efficient retrieval. This index is under protection by Paillier cryptosystem before it gets uploaded to the server.
引用
收藏
页码:1397 / 1398
页数:2
相关论文
共 50 条
  • [1] Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data
    Yang, Yutao
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 392 - 402
  • [2] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775
  • [3] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [4] Outsourced privacy-preserving classification service over encrypted data
    Li, Tong
    Huang, Zhengan
    Li, Ping
    Liu, Zheli
    Jia, Chunfu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 106 : 100 - 110
  • [5] Efficient and Privacy-Preserving Eclipse Query over Encrypted Data
    Song, Weiyu
    Zhang, Yonggang
    Sun, Lili
    Zheng, Yandong
    Lu, Rongxing
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1 - 6
  • [6] Privacy-Preserving Hierarchical Anonymization Framework over Encrypted Data
    Jia, Jing
    Saito, Kenta
    Nishi, Hiroaki
    IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (10) : 1011 - 1019
  • [7] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [8] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [9] Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving
    Xu, Lei
    Xu, Chungen
    Liu, Zhongyi
    Wang, Yunling
    Wang, Jianfeng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (02): : 675 - 690
  • [10] Improvement on a privacy-preserving outsourced classification protocol over encrypted data
    Chai, Yanting
    Zhan, Yu
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    WIRELESS NETWORKS, 2020, 26 (06) : 4363 - 4374