Skip to main content

A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11064))

Included in the following conference series:

  • 1986 Accesses

Abstract

Cloud computing has become increasingly popular because of the benefits it provides. However, the security of the data stored in a remote cloud has become a major concern. For privacy concerns, searchable encryption (SE), which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, most SE schemes can only support single data owner which is opposite to the condition in the cloud environment. In this paper, we employed locality-sensitive hashing (LSH) and bilinear map to deal with a privacy preserving similarity search for multiple data owners. In our scheme, data users can encrypt their data using their own secret keys. And the data users can perform the similarity search without knowing any information about the secret keys which belong to the data owners. We formally analyzed the security strength of our scheme. Extensive experiments on actual datasets showed that our scheme is extremely effective and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Inform. https://doi.org/10.1109/TII2018.2809672

  2. Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2017)

    Google Scholar 

  3. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy, pp. 44–55 (2000)

    Google Scholar 

  4. Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, 216 (2013)

    Google Scholar 

  5. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30

    Chapter  Google Scholar 

  6. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  7. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  8. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3

    Chapter  Google Scholar 

  9. Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414–426. Springer, Heidelberg (2005). https://doi.org/10.1007/11602897_35

    Chapter  Google Scholar 

  10. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

  11. Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp. 350–364 (2007)

    Google Scholar 

  12. Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for E-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)

    Article  Google Scholar 

  13. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM, pp. 829–837 (2011)

    Google Scholar 

  14. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  15. Sun, W., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)

    Article  Google Scholar 

  16. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  17. Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: 6th International Conference on Cloud Computing. LNCS, vol. 8201, pp. 390–397. (2013)

    Google Scholar 

  18. Fu, Z.J., Shu, J.G., Wang, J., Liu, Y.L., Lee, S.Y.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453–460 (2015)

    Google Scholar 

  19. Tao, Y., Yi, K., Sheng, C., Kalnis, P.: Quality and efficiency in high dimensional nearest neighbor search. In: ACM SIGMOD International Conference on Management of Data, pp. 563–576 (2009)

    Google Scholar 

  20. Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE International Conference on Computer Communications, pp. 451–459 (2012)

    Google Scholar 

  21. Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-Nearest neighbor query over encrypted data in outsourced environments. In: IEEE ICDE, pp. 664–675 (2014)

    Google Scholar 

  22. Yuan, X., Cui, H., Wang, X., Wang, C.: Enabling privacy-assured similarity retrieval over millions of encrypted records. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 40–60. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24177-7_3

    Chapter  Google Scholar 

  23. Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: IEEE International Conference on Computer Communications, pp. 1–9 (2016)

    Google Scholar 

  24. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_13

    Chapter  Google Scholar 

  25. Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: IEEE Symposium on Security and Privacy, pp. 463–477 (2013)

    Google Scholar 

  26. Zhang, W., Xiao, Y., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE/IFIP International Conference on Dependable System and Networks, Atlanta, USA, pp. 276–286 (2014)

    Google Scholar 

  27. Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2015)

    Article  MathSciNet  Google Scholar 

  28. Cui, H., Yuan, X., Zheng, Y., Wang, C.: Enabling secure and effective near-duplicate detection over encrypted in-network storage. In: IEEE International Conference on Computer Communications, pp. 1–9 (2016)

    Google Scholar 

  29. Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: 20th Symposium on Computational Geometry, pp. 253–262 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pengxu Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, C., Tian, P., Jie, Y., Tang, X. (2018). A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00009-7_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00008-0

  • Online ISBN: 978-3-030-00009-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics