On Private Similarity Search Protocols
نویسندگان
چکیده
In a private similarity search (PSS) protocol, a client receives from the database the entry, closest to her query, without either the client or the database getting to know more information than necessary. PSS protocols have potentially wide application in areas like bioinformatics, where precise queries might be impossible. We show that the previously proposed PSS protocols by Du and Atallah have serious weaknesses; in particular, some of their protocols can be broken by a semi-honest third party who observes a relatively small amount of traffic. In several cases, we show that even maximally securified versions of these protocols— when used as proposed by Du and Atallah—are not private in the sense, needed in the practice. We propose a few protocols that are better from the privacy viewpoint, but none of the proposed protocols is really efficient.
منابع مشابه
A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
With the growing popularity of cloud computing, more and more users outsource their private data to the cloud. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to the cloud server, which brings incommodity of data operating. This paper proposes a scheme for similar search on encrypted images. In the setup phase, image owner extra...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملSecure computation of functionalities based on Hamming distance and its application to computing document similarity
This paper examines secure two-party computation of functions which depend only on the Hammingdistance of the inputs of the two parties. We present efficient protocols for computing these functions.In particular, we present protocols which are secure in the sense of full simulatability against maliciousadversaries.We then show applications of HDOT. These include protocols for ch...
متن کاملRational behavior in peer-to-peer profile obfuscation for anonymous keyword search
User profiling in web search has the advantage of enabling personalized web search: the quality of the results offered by the search engine to the user is increased by taking the user’s interests into account when presenting those results. The negative side is that the interests and the query history of users may contain information considered as private; hence, technology should be provided fo...
متن کاملA Survey on Secure Processing of Similarity Queries
With the rapid growth of the volume and diversity of digital data produced by all kinds of commercial, scientific and leisure-time applications, the extraction of useful information from these large data sets has become one of the key IT tasks. On the other hand, the constant monitoring of people’s activities, while using these applications, has raised people’s concern about the invasiveness of...
متن کامل