A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners

被引:1
作者
Guo, Cheng [1 ,2 ]
Tian, Pengxu [1 ,2 ]
Jie, Yingmo [1 ,2 ]
Tang, Xinyu [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2018年 / 11064卷
关键词
Searchable encryption; Multiple data owners; Similarity search; KEYWORD RANKED SEARCH; CLOUD; SECURE;
D O I
10.1007/978-3-030-00009-7_44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has become increasingly popular because of the benefits it provides. However, the security of the data stored in a remote cloud has become a major concern. For privacy concerns, searchable encryption (SE), which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, most SE schemes can only support single data owner which is opposite to the condition in the cloud environment. In this paper, we employed locality-sensitive hashing (LSH) and bilinear map to deal with a privacy preserving similarity search for multiple data owners. In our scheme, data users can encrypt their data using their own secret keys. And the data users can perform the similarity search without knowing any information about the secret keys which belong to the data owners. We formally analyzed the security strength of our scheme. Extensive experiments on actual datasets showed that our scheme is extremely effective and efficient.
引用
收藏
页码:484 / 495
页数:12
相关论文
共 29 条
[1]  
[Anonymous], 2015, IEEE T COMPUT
[2]  
[Anonymous], IACR CRYPTOLOGY EPRI
[3]  
[Anonymous], IEEE T IND INFORM
[4]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[5]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[9]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[10]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442