Efficient privacy-preserving similar document detection

被引:53
作者
Murugesan, Mummoorthy [2 ]
Jiang, Wei [3 ]
Clifton, Chris [2 ]
Si, Luo [2 ]
Vaidya, Jaideep [1 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
基金
美国国家科学基金会;
关键词
Privacy; Information retrieval;
D O I
10.1007/s00778-009-0175-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Similar document detection plays important roles in many applications, such as file management, copyright protection, plagiarism prevention, and duplicate submission detection. The state of the art protocols assume that the contents of files stored on a server (or multiple servers) are directly accessible. However, this makes such protocols unsuitable for any environment where the documents themselves are sensitive and cannot be openly read. Essentially, this assumption limits more practical applications, e.g., detecting plagiarized documents between two conferences, where submissions are confidential. We propose novel protocols to detect similar documents between two entities where documents cannot be openly shared with each other. The similarity measure used can be a simple cosine similarity on entire documents or on document fragments, enabling detection of partial copying. We conduct extensive experiments to show the practical value of the proposed protocols. While the proposed base protocols are much more efficient than the general secure multiparty computation based solutions, they are still slow for large document sets. We then investigate a clustering based approach that significantly reduces the running time and achieves over 90% of accuracy in our experiments. This makes secure similar document detection both practical and feasible.
引用
收藏
页码:457 / 475
页数:19
相关论文
共 30 条
[1]   PROCESSING ENCRYPTED DATA [J].
AHITUV, N ;
LAPID, Y ;
NEUMANN, S .
COMMUNICATIONS OF THE ACM, 1987, 30 (09) :777-780
[2]  
Baeza-Yates R, 1999, MODERN INFORM RETRIE, V463
[3]  
Bernstein Y, 2006, LECT NOTES COMPUT SC, V4209, P110
[4]  
BRIN S, 1995, P 1995 ACM SIGMOD IN, P398
[5]   On the resemblance and containment of documents [J].
Broder, AZ .
COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, :21-29
[6]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[7]  
Collberg C., 2003, P IADIS INT C WWW IN, P508
[8]  
Duda R. O., 1973, Pattern Classification and Scene Analysis, V3
[9]  
FEDERICA M, 2004, INT J DIGIT LIBR, V4, P223
[10]  
Fukunaga K, 1990, INTRO STAT PATTERN R, V2nd