Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records

نویسندگان

  • Xingliang Yuan
  • Helei Cui
  • Xinyu Wang
  • Cong Wang
چکیده

Searchable symmetric encryption (SSE) has been studied extensively for its full potential in enabling exact-match queries on encrypted records. Yet, situations for similarity queries remain to be fully explored. In this paper, we design privacy-assured similarity search schemes over millions of encrypted high-dimensional records. Our design employs locality-sensitive hashing (LSH) and SSE, where the LSH hash values of records are treated as keywords fed into the framework of SSE. As direct combination of the two does not facilitate a scalable solution for large datasets, we then leverage a set of advanced hash-based algorithms including multiple-choice hashing, open addressing, and cuckoo hashing, and craft a high performance encrypted index from the ground up. It is not only space efficient, but supports secure and sufficiently accurate similarity search with constant time. Our designs are proved to be secure against adaptive adversaries. The experiment on 10 million encrypted records demonstrates that our designs function in a practical manner. This paper was presented at the 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria, September 21-25, 2015. Supervisor: Dr Cong WANG Research Interests: Cloud Computing; Data and Computation Outsourcing Security; Mobile Security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Efficient Privacy Preserving Medical Image Retrieval Using ROI Enabled Searchable Encryption

In this paper, we propose a new idea of searchable medical image encryption method to provide secrecy or authentication when a database is stashed away on a host maintained by a third-party server. This project addresses the trouble of enabling content based image retrieval throughout encrypted medical image dataset. Medical image database is encrypted by the owner of the content before transmi...

متن کامل

Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data

Nowadays, more and more people are motivated to outsource their local data to public cloud servers for great convenience and reduced costs in data management. But in consideration of privacy issues, sensitive data should be encrypted before outsourcing, which obsoletes traditional data utilization like keyword-based document retrieval. In this paper, we present a secure and efficient multi-keyw...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Privacy Preserving Search of Multimedia

The advancement of information technology is rapidly integrating the physical world where we live and the online world where we retrieve and share information. One immediate example of such integration is the increasing popularity of storing and managing personal data using third-party web services, as part of the emerging trend of cloud computing. Secure management of sensitive data stored onl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015