A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings

被引:1
作者
Aritomo, Daisuke [1 ]
Watanabe, Chiemi [2 ]
Matsubara, Masaki [3 ]
Morishima, Atsuyuki [3 ]
机构
[1] Univ Tsukuba, Grad Sch Lib Informat & Media Studies, Tsukuba, Ibaraki, Japan
[2] Tsukuba Univ Technol, Dept Ind Informat, Tsukuba, Ibaraki, Japan
[3] Univ Tsukuba, Fac Lib Informat & Media Sci, Tsukuba, Ibaraki, Japan
来源
IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES | 2019年
关键词
similarity search; searchable encryption; LSH; VP-tree; cloud computing;
D O I
10.1145/3366030.3366081
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent evolution in cloud computing platforms have attracted the largest amount of data than ever before. Today, even the most sensitive data are being outsourced, thus, protection is essential to ensure that privacy is not traded for the convenience provided by cloud platforms. Traditional symmetric encryption schemes provide good protection; however, they ruin the merits of cloud computing. Attempts have been made to obtain a scheme where both functionality and protection can be achieved. However, features provided in existing searchable encryption schemes tend to be left behind the latest findings in the information retrieval (IR) area. In this study, we propose a privacy-preserving similar document search system based on Simhash. Our scheme is open to the latest machine-learning based IR schemes, and performance has been tuned utilizing a VP-tree based index, which is optimized for security. Analysis and various tests on real-world datasets demonstrate the scheme's security and efficiency on real-world datasets.
引用
收藏
页码:403 / 412
页数:10
相关论文
共 19 条
[1]  
[Anonymous], 1990, P 1990 ACM SIGMOD IN, DOI DOI 10.1145/93597.98741
[2]   MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING [J].
BENTLEY, JL .
COMMUNICATIONS OF THE ACM, 1975, 18 (09) :509-517
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[5]   On the resemblance and containment of documents [J].
Broder, AZ .
COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, :21-29
[6]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[7]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[8]  
Charikar Moses S, 2002, P 34 ANN ACM S THEOR, P380
[9]  
Curtmola R., 2006, ACM CCS, P79, DOI DOI 10.1145/1180405.1180417
[10]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559