Advertisement

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

  • Changhee Hahn
  • Hyung June Shin
  • Hyunsoo Kwon
  • Junbeom Hur
Article

Abstract

In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.

Keywords

Similarity search Searchable encryption Security Privacy Cloud computing 

Notes

Acknowledgements

This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD160070BD).

References

  1. 1.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522).Google Scholar
  2. 2.
    Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy (pp. 44–55).Google Scholar
  3. 3.
    Golle, P., Staddon, J., & Waters, B. (2004). Secure conjunctive keyword search over encrypted data. In IEEE international conference on applied cryptography and network security.Google Scholar
  4. 4.
    Ballard, L., Kamara, S., & Monrose, F. (2005). Achieving efficient conjunctive keyword searches over encrypted data. In IEEE international conference on information and communications security.Google Scholar
  5. 5.
    Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security (pp. 79–88).Google Scholar
  6. 6.
    Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Distributed computing systems (ICDCS) Google Scholar
  7. 7.
    Hwang, Y. H. & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In International conference on pairing-based cryptography (pp. 2–22).Google Scholar
  8. 8.
    Wang, P., Wang, H., & Pieprzyk, J. (2007). Common secure index for conjunctive keyword-based retrieval over encrypted data. In Workshop on secure data management (pp. 108–123).Google Scholar
  9. 9.
    Wang, P., Wang, H., & Pieprzyk, J. (2008). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In International workshop on information security applications (pp. 145–159).Google Scholar
  10. 10.
    Wang, P., Wang, H., & Pieprzyk, J. (2008). Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In International conference on cryptology and network security (pp. 178–195).Google Scholar
  11. 11.
  12. 12.
    Ke, Y., Sukthankar, R., Huston, L., Ke, Y., & Sukthankar, R. (2004). Efficient near-duplicate detection and sub-image retrieval. In ACM Multimedia.Google Scholar
  13. 13.
    Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In 2012 IEEE 28th international conference on data engineering (ICDE) (pp. 1156–1167).Google Scholar
  14. 14.
    Yuan, X., Wang, X., Wang, C., Squicciarini, A., & Ren K. (2014). Enabling privacy-preserving image-centric social discovery. In Distributed computing systems (ICDCS) (pp. 198–207).Google Scholar
  15. 15.
    Cui, H., Yuan, X., Zheng, Y., Wang C. (2016). Enabling secure and effective near-duplicate detection over encrypted in-network storage. In The 35th international conference on computer communications (INFOCOM).Google Scholar
  16. 16.
    Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2010). Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 10(2), 667–684.Google Scholar
  17. 17.
    Popa, R. A., & Zeldovich, N. (2013). Multi-key searchable encryption. In IACR Cryptology ePrint Archive.Google Scholar
  18. 18.
    Kiayias, A., Oksuz, O., Russell, A., Tang, Q., & Wang, B. (2016). Efficient encrypted keyword search for multi-user data sharing. In European symposium on research in computer security (pp. 173–195).Google Scholar
  19. 19.
    Sun, S. F., Liu, J. K., Sakzad, A., Steinfeld, R., & Yuen, T. H. (2016). An efficient non-interactive multi-client searchable encryption with support for boolean queries. In European symposium on research in computer security (pp. 154–172).Google Scholar
  20. 20.
    Wang, P., Wang, H., & Pieprzyk, J. (2008). Threshold privacy preserving keyword searches. In International conference on cryptology and network security (pp. 646–658).Google Scholar
  21. 21.
    Strizhov, M., & Ray, I. Multi-keyword similarity search over encrypted cloud data. In IFIP international information security conference (pp. 52–65). Berlin: Springer.Google Scholar
  22. 22.
    Cash, D., Grubbs, P., Perry, J., & Ristenpart, T. (2015). Leakage-abuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 668–679).Google Scholar
  23. 23.
    Pouliot, D., & Wright, C. V. (2016). The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 1341–1352).Google Scholar
  24. 24.
    Gionis, A., Indyk, P., & Motwani, R. (1999). Similarity search in high dimensions via hashing, In VLDB (pp. 518–529).Google Scholar
  25. 25.
    ImageHash 2.2. Retrieved August 20, 2016 from https://pypi.org/project/ImageHash/2.2/.
  26. 26.
    De Caro, A., & Iovino, V. (2011). jPBC: Java pairing based cryptography. In IEEE symposium on computers and communications (ISCC) (pp. 850–855).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Changhee Hahn
    • 1
  • Hyung June Shin
    • 1
  • Hyunsoo Kwon
    • 1
  • Junbeom Hur
    • 1
  1. 1.Department of Computer Science and EngineeringKorea UniversitySeoulKorea

Personalised recommendations