A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings

被引:1
作者
Aritomo, Daisuke [1 ]
Watanabe, Chiemi [2 ]
Matsubara, Masaki [3 ]
Morishima, Atsuyuki [3 ]
机构
[1] Univ Tsukuba, Grad Sch Lib Informat & Media Studies, Tsukuba, Ibaraki, Japan
[2] Tsukuba Univ Technol, Dept Ind Informat, Tsukuba, Ibaraki, Japan
[3] Univ Tsukuba, Fac Lib Informat & Media Sci, Tsukuba, Ibaraki, Japan
来源
IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES | 2019年
关键词
similarity search; searchable encryption; LSH; VP-tree; cloud computing;
D O I
10.1145/3366030.3366081
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent evolution in cloud computing platforms have attracted the largest amount of data than ever before. Today, even the most sensitive data are being outsourced, thus, protection is essential to ensure that privacy is not traded for the convenience provided by cloud platforms. Traditional symmetric encryption schemes provide good protection; however, they ruin the merits of cloud computing. Attempts have been made to obtain a scheme where both functionality and protection can be achieved. However, features provided in existing searchable encryption schemes tend to be left behind the latest findings in the information retrieval (IR) area. In this study, we propose a privacy-preserving similar document search system based on Simhash. Our scheme is open to the latest machine-learning based IR schemes, and performance has been tuned utilizing a VP-tree based index, which is optimized for security. Analysis and various tests on real-world datasets demonstrate the scheme's security and efficiency on real-world datasets.
引用
收藏
页码:403 / 412
页数:10
相关论文
共 19 条
[11]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[12]   A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners [J].
Guo, Cheng ;
Tian, Pengxu ;
Jie, Yingmo ;
Tang, Xinyu .
CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 :484-495
[13]  
Guttman A., 1984, SIGMOD Record, V14, P47, DOI 10.1145/971697.602266
[14]  
Mikolov T., 2013, P 1 INT C LEARN REPR, DOI [DOI 10.48550/ARXIV.1301.3781, 10.48550/arXiv.1301.3781]
[15]   Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance [J].
Roy, Dwaipayan ;
Ganguly, Debasis ;
Bhatia, Sumit ;
Bedathur, Srikanta ;
Mitra, Mandar .
CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, :1835-1838
[16]  
Song Dawn Xiaodong, 2000, P 2000 IEEE S SEC PR, V44
[17]  
Sun W., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, P71, DOI [10.1145/2484313.2484322, DOI 10.1145/2484313.2484322]
[18]   A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].
Xia, Zhihua ;
Wang, Xinhui ;
Sun, Xingming ;
Wang, Qian .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) :340-352
[19]  
YIANILOS PN, 1993, PROCEEDINGS OF THE FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P311