location: Current position: Home >> Scientific Research >> Paper Publications

Privacy preserving weighted similarity search scheme for encrypted data

Hits:

Indexed by:期刊论文

First Author:Guo, Cheng

Correspondence Author:Chang, CC (reprint author), Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan.

Co-author:Tian, Pengxu,Chang, Chin-Chen

Date of Publication:2019-01-01

Journal:IET INFORMATION SECURITY

Included Journals:SCIE、Scopus

Volume:13

Issue:1

Page Number:61-69

ISSN No.:1751-8709

Key Words:cryptography; outsourcing; cloud computing; data privacy; different weighted searches; encrypted data; searchable symmetric encryption; data users; search request; homomorphic encryption; weight problem; weight information; weighted similarity search scheme; cloud computing; outsourced data; privacy concerns; searchable encryption; different users; different requirements

Abstract:Cloud computing has become increasingly popular among individuals and enterprises because of the benefits it provides by outsourcing their data to cloud servers. However, the security of the outsourced data has become a major concern. For privacy concerns, searchable encryption, which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, different users may have different requirements on their queries, which mean different weighted searches. This problem can be solved perfectly in the plaintext domain, but hard to be addressed over encrypted data. In this study, the authors use locality-sensitive hashing (LSH) and searchable symmetric encryption (SSE) to deal with a privacy preserving weighted similarity search. In the authors' scheme, data users can generate a search request and set the weight for each attribute according to their requirements. They treat the LSH values as keywords and mix them into the framework of SSE. They use homomorphic encryption to securely address the weight problem and return the top-k data without revealing any weight information of data users. They formally analysed the security strength of their scheme. Extensive experiments on actual datasets showed that their scheme is extremely effective and efficient.

Pre One:RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks

Next One:Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing