Enabling privacy-assured similarity retrieval over millions of encrypted records

Xingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

41 Scopus citations

Abstract

Searchable symmetric encryption (SSE) has been studied extensively for its full potential in enabling exact-match queries on encrypted records. Yet, situations for similarity queries remain to be fully explored. In this paper, we design privacy-assured similarity search schemes over millions of encrypted high-dimensional records. Our design employs locality-sensitive hashing (LSH) and SSE, where the LSH hash values of records are treated as keywords fed into the framework of SSE. As direct combination of the two does not facilitate a scalable solution for large datasets, we then leverage a set of advanced hash-based algorithms including multiple-choice hashing, open addressing, and cuckoo hashing, and craft a high performance encrypted index from the ground up. It is not only space efficient, but supports secure and sufficiently accurate similarity search with constant time. Our designs are proved to be secure against adaptive adversaries. The experiment on 10 million encrypted records demonstrates that our designs function in a practical manner.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings
EditorsGünther Pernul, Peter Y.A. Ryan, Edgar Weippl
PublisherSpringer Verlag
Pages40-60
Number of pages21
ISBN (Print)9783319241760
DOIs
StatePublished - 2015
Externally publishedYes
Event20th European Symposium on Research in Computer Security, ESORICS 2015 - Vienna, Austria
Duration: 21 Sep 201525 Sep 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9327
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th European Symposium on Research in Computer Security, ESORICS 2015
Country/TerritoryAustria
CityVienna
Period21/09/1525/09/15

Keywords

  • Cloud security
  • Encrypted storage
  • Similarity retrieval

Fingerprint

Dive into the research topics of 'Enabling privacy-assured similarity retrieval over millions of encrypted records'. Together they form a unique fingerprint.

Cite this