4.7 Article

Secure Similarity Search Over Encrypted Non-Uniform Datasets

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 10, 期 3, 页码 2102-2117

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2020.3000233

关键词

Cloud security; similarity search; searchable encryption; selective hashing

资金

  1. National Natural Science Foundation of China [61501080, 61572095, 61871064, 61702105, U1804263]

向作者/读者索取更多资源

This article presents a method called SEND for secure similarity search over encrypted non-uniform and high-dimensional datasets. By combining SSE with locality-sensitive hashing and utilizing selective hashing and query set distribution hiding techniques, SEND achieves high search quality in terms of recall and precision, and is proven secure against adaptively chosen query attacks in the standard model.
Searchable symmetric encryption (SSE) enables a user to outsource a private dataset to a cloud server in encrypted form while retaining the ability to search over the encrypted outsourced data. The existing SSE schemes improve the search and safety performances from different perspectives. However, almost none of the existing SSE schemes considers the data distribution issues. We find that when the dataset is not distributed uniformly, the search quality based on the conventional methods decreases. Therefore, the existing SSE schemes cannot guarantee high search quality when faced with non-uniform datasets. In addition, most existing SSE solutions cannot hide the distribution of the query set. In this article, we design a S\ecure similarity search over Encrypted Non-uniform and high-dimensional Datasets (SEND) with a novel way to enhance security. The basic idea is to combine SSE with locality-sensitive hashing (LSH). Unlike earlier schemes, SEND uses selective hashing, which has better performance for non-uniform datasets. Also, we present a novel approach to hide the distribution of the query set, which makes SEND more secure. Our experimental results indicate SEND achieves a high search quality of recall and precision, and it is proven secure against adaptively chosen query attacks in the standard model.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据