Abstract
Cloud computing has become increasingly popular because of the benefits it provides. However, the security of the data stored in a remote cloud has become a major concern. For privacy concerns, searchable encryption (SE), which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, most SE schemes can only support single data owner which is opposite to the condition in the cloud environment. In this paper, we employed locality-sensitive hashing (LSH) and bilinear map to deal with a privacy preserving similarity search for multiple data owners. In our scheme, data users can encrypt their data using their own secret keys. And the data users can perform the similarity search without knowing any information about the secret keys which belong to the data owners. We formally analyzed the security strength of our scheme. Extensive experiments on actual datasets showed that our scheme is extremely effective and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Inform. https://doi.org/10.1109/TII2018.2809672
Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy, pp. 44–55 (2000)
Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, 216 (2013)
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3
Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414–426. Springer, Heidelberg (2005). https://doi.org/10.1007/11602897_35
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29
Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp. 350–364 (2007)
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for E-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM, pp. 829–837 (2011)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Sun, W., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: 6th International Conference on Cloud Computing. LNCS, vol. 8201, pp. 390–397. (2013)
Fu, Z.J., Shu, J.G., Wang, J., Liu, Y.L., Lee, S.Y.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015)
Tao, Y., Yi, K., Sheng, C., Kalnis, P.: Quality and efficiency in high dimensional nearest neighbor search. In: ACM SIGMOD International Conference on Management of Data, pp. 563–576 (2009)
Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE International Conference on Computer Communications, pp. 451–459 (2012)
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-Nearest neighbor query over encrypted data in outsourced environments. In: IEEE ICDE, pp. 664–675 (2014)
Yuan, X., Cui, H., Wang, X., Wang, C.: Enabling privacy-assured similarity retrieval over millions of encrypted records. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 40–60. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24177-7_3
Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: IEEE International Conference on Computer Communications, pp. 1–9 (2016)
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_13
Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: IEEE Symposium on Security and Privacy, pp. 463–477 (2013)
Zhang, W., Xiao, Y., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International Conference on Dependable System and Networks, Atlanta, USA, pp. 276–286 (2014)
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2015)
Cui, H., Yuan, X., Zheng, Y., Wang, C.: Enabling secure and effective near-duplicate detection over encrypted in-network storage. In: IEEE International Conference on Computer Communications, pp. 1–9 (2016)
Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: 20th Symposium on Computational Geometry, pp. 253–262 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, C., Tian, P., Jie, Y., Tang, X. (2018). A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-00009-7_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00008-0
Online ISBN: 978-3-030-00009-7
eBook Packages: Computer ScienceComputer Science (R0)