Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

Changhee Hahn, Hyung June Shin, Hyunsoo Kwon, Junbeom Hur

Research output: Contribution to journalArticle

Abstract

In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.

Original languageEnglish
Pages (from-to)1-17
Number of pages17
JournalWireless Personal Communications
DOIs
Publication statusAccepted/In press - 2018 Apr 17

Fingerprint

Outsourcing
Semantics
Communication
Testing
Costs

Keywords

  • Cloud computing
  • Privacy
  • Searchable encryption
  • Security
  • Similarity search

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. / Hahn, Changhee; Shin, Hyung June; Kwon, Hyunsoo; Hur, Junbeom.

In: Wireless Personal Communications, 17.04.2018, p. 1-17.

Research output: Contribution to journalArticle

@article{5dc6463f30e143ea85f1ed48df5370e6,
title = "Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage",
abstract = "In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.",
keywords = "Cloud computing, Privacy, Searchable encryption, Security, Similarity search",
author = "Changhee Hahn and Shin, {Hyung June} and Hyunsoo Kwon and Junbeom Hur",
year = "2018",
month = "4",
day = "17",
doi = "10.1007/s11277-018-5744-z",
language = "English",
pages = "1--17",
journal = "Wireless Personal Communications",
issn = "0929-6212",
publisher = "Springer Netherlands",

}

TY - JOUR

T1 - Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

AU - Hahn, Changhee

AU - Shin, Hyung June

AU - Kwon, Hyunsoo

AU - Hur, Junbeom

PY - 2018/4/17

Y1 - 2018/4/17

N2 - In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.

AB - In cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.

KW - Cloud computing

KW - Privacy

KW - Searchable encryption

KW - Security

KW - Similarity search

UR - http://www.scopus.com/inward/record.url?scp=85045426406&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85045426406&partnerID=8YFLogxK

U2 - 10.1007/s11277-018-5744-z

DO - 10.1007/s11277-018-5744-z

M3 - Article

AN - SCOPUS:85045426406

SP - 1

EP - 17

JO - Wireless Personal Communications

JF - Wireless Personal Communications

SN - 0929-6212

ER -