Skip to main content
Log in

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. The authors assume that data owners and users hold the secret keys in advance.

References

  1. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506–522).

  2. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy (pp. 44–55).

  3. Golle, P., Staddon, J., & Waters, B. (2004). Secure conjunctive keyword search over encrypted data. In IEEE international conference on applied cryptography and network security.

  4. Ballard, L., Kamara, S., & Monrose, F. (2005). Achieving efficient conjunctive keyword searches over encrypted data. In IEEE international conference on information and communications security.

  5. Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on computer and communications security (pp. 79–88).

  6. Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Distributed computing systems (ICDCS)

  7. Hwang, Y. H. & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In International conference on pairing-based cryptography (pp. 2–22).

  8. Wang, P., Wang, H., & Pieprzyk, J. (2007). Common secure index for conjunctive keyword-based retrieval over encrypted data. In Workshop on secure data management (pp. 108–123).

  9. Wang, P., Wang, H., & Pieprzyk, J. (2008). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In International workshop on information security applications (pp. 145–159).

  10. Wang, P., Wang, H., & Pieprzyk, J. (2008). Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In International conference on cryptology and network security (pp. 178–195).

  11. INRIA Copydays, http://lear.inrialpes.fr/people/jegou/data.php#copydays.

  12. Ke, Y., Sukthankar, R., Huston, L., Ke, Y., & Sukthankar, R. (2004). Efficient near-duplicate detection and sub-image retrieval. In ACM Multimedia.

  13. Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In 2012 IEEE 28th international conference on data engineering (ICDE) (pp. 1156–1167).

  14. Yuan, X., Wang, X., Wang, C., Squicciarini, A., & Ren K. (2014). Enabling privacy-preserving image-centric social discovery. In Distributed computing systems (ICDCS) (pp. 198–207).

  15. Cui, H., Yuan, X., Zheng, Y., Wang C. (2016). Enabling secure and effective near-duplicate detection over encrypted in-network storage. In The 35th international conference on computer communications (INFOCOM).

  16. Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2010). Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 10(2), 667–684.

    Google Scholar 

  17. Popa, R. A., & Zeldovich, N. (2013). Multi-key searchable encryption. In IACR Cryptology ePrint Archive.

  18. Kiayias, A., Oksuz, O., Russell, A., Tang, Q., & Wang, B. (2016). Efficient encrypted keyword search for multi-user data sharing. In European symposium on research in computer security (pp. 173–195).

  19. Sun, S. F., Liu, J. K., Sakzad, A., Steinfeld, R., & Yuen, T. H. (2016). An efficient non-interactive multi-client searchable encryption with support for boolean queries. In European symposium on research in computer security (pp. 154–172).

  20. Wang, P., Wang, H., & Pieprzyk, J. (2008). Threshold privacy preserving keyword searches. In International conference on cryptology and network security (pp. 646–658).

  21. Strizhov, M., & Ray, I. Multi-keyword similarity search over encrypted cloud data. In IFIP international information security conference (pp. 52–65). Berlin: Springer.

  22. Cash, D., Grubbs, P., Perry, J., & Ristenpart, T. (2015). Leakage-abuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 668–679).

  23. Pouliot, D., & Wright, C. V. (2016). The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 1341–1352).

  24. Gionis, A., Indyk, P., & Motwani, R. (1999). Similarity search in high dimensions via hashing, In VLDB (pp. 518–529).

  25. ImageHash 2.2. Retrieved August 20, 2016 from https://pypi.org/project/ImageHash/2.2/.

  26. De Caro, A., & Iovino, V. (2011). jPBC: Java pairing based cryptography. In IEEE symposium on computers and communications (ISCC) (pp. 850–855).

Download references

Acknowledgements

This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD160070BD).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junbeom Hur.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hahn, C., Shin, H.J., Kwon, H. et al. Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. Wireless Pers Commun 107, 1337–1353 (2019). https://doi.org/10.1007/s11277-018-5744-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5744-z

Keywords

Navigation