Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage
In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.
KeywordsSimilarity search Searchable encryption Security Privacy Cloud computing
This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD160070BD).
- 1.Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522).Google Scholar
- 2.Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy (pp. 44–55).Google Scholar
- 3.Golle, P., Staddon, J., & Waters, B. (2004). Secure conjunctive keyword search over encrypted data. In IEEE international conference on applied cryptography and network security.Google Scholar
- 4.Ballard, L., Kamara, S., & Monrose, F. (2005). Achieving efficient conjunctive keyword searches over encrypted data. In IEEE international conference on information and communications security.Google Scholar
- 5.Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security (pp. 79–88).Google Scholar
- 6.Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Distributed computing systems (ICDCS) Google Scholar
- 7.Hwang, Y. H. & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In International conference on pairing-based cryptography (pp. 2–22).Google Scholar
- 8.Wang, P., Wang, H., & Pieprzyk, J. (2007). Common secure index for conjunctive keyword-based retrieval over encrypted data. In Workshop on secure data management (pp. 108–123).Google Scholar
- 9.Wang, P., Wang, H., & Pieprzyk, J. (2008). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In International workshop on information security applications (pp. 145–159).Google Scholar
- 10.Wang, P., Wang, H., & Pieprzyk, J. (2008). Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In International conference on cryptology and network security (pp. 178–195).Google Scholar
- 11.INRIA Copydays, http://lear.inrialpes.fr/people/jegou/data.php#copydays.
- 12.Ke, Y., Sukthankar, R., Huston, L., Ke, Y., & Sukthankar, R. (2004). Efficient near-duplicate detection and sub-image retrieval. In ACM Multimedia.Google Scholar
- 13.Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In 2012 IEEE 28th international conference on data engineering (ICDE) (pp. 1156–1167).Google Scholar
- 14.Yuan, X., Wang, X., Wang, C., Squicciarini, A., & Ren K. (2014). Enabling privacy-preserving image-centric social discovery. In Distributed computing systems (ICDCS) (pp. 198–207).Google Scholar
- 15.Cui, H., Yuan, X., Zheng, Y., Wang C. (2016). Enabling secure and effective near-duplicate detection over encrypted in-network storage. In The 35th international conference on computer communications (INFOCOM).Google Scholar
- 16.Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2010). Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 10(2), 667–684.Google Scholar
- 17.Popa, R. A., & Zeldovich, N. (2013). Multi-key searchable encryption. In IACR Cryptology ePrint Archive.Google Scholar
- 18.Kiayias, A., Oksuz, O., Russell, A., Tang, Q., & Wang, B. (2016). Efficient encrypted keyword search for multi-user data sharing. In European symposium on research in computer security (pp. 173–195).Google Scholar
- 19.Sun, S. F., Liu, J. K., Sakzad, A., Steinfeld, R., & Yuen, T. H. (2016). An efficient non-interactive multi-client searchable encryption with support for boolean queries. In European symposium on research in computer security (pp. 154–172).Google Scholar
- 20.Wang, P., Wang, H., & Pieprzyk, J. (2008). Threshold privacy preserving keyword searches. In International conference on cryptology and network security (pp. 646–658).Google Scholar
- 21.Strizhov, M., & Ray, I. Multi-keyword similarity search over encrypted cloud data. In IFIP international information security conference (pp. 52–65). Berlin: Springer.Google Scholar
- 22.Cash, D., Grubbs, P., Perry, J., & Ristenpart, T. (2015). Leakage-abuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 668–679).Google Scholar
- 23.Pouliot, D., & Wright, C. V. (2016). The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 1341–1352).Google Scholar
- 24.Gionis, A., Indyk, P., & Motwani, R. (1999). Similarity search in high dimensions via hashing, In VLDB (pp. 518–529).Google Scholar
- 25.ImageHash 2.2. Retrieved August 20, 2016 from https://pypi.org/project/ImageHash/2.2/.
- 26.De Caro, A., & Iovino, V. (2011). jPBC: Java pairing based cryptography. In IEEE symposium on computers and communications (ISCC) (pp. 850–855).Google Scholar