Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds

Outsourcing data in clouds is adopted by more and more companies and individuals due to the profits from data sharing and parallel, elastic, and on-demand computing. However, it forces data owners to lose control of their own data, which causes privacy-preserving problems on sensitive data. Sorting is a common operation in many areas, such as machine learning, service recommendation, and data query. It is a challenge to implement privacy-preserving sorting over encrypted data without leaking privacy of sensitive data. In this paper, we propose privacy-preserving sorting algorithms which are on the basis of the logistic map. Secure comparable codes are constructed by logistic map functions, which can be utilized to compare the corresponding encrypted data items even without knowing their plaintext values. Data owners firstly encrypt their data and generate the corresponding comparable codes and then outsource them to clouds. Cloud servers are capable of sorting the outsourced encrypted data in accordance with their corresponding comparable codes by the proposed privacy-preserving sorting algorithms. Security analysis and experimental results show that the proposed algorithms can protect data privacy, while providing efficient sorting on encrypted data.

[1]  Charles V. Wright,et al.  Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.

[2]  Miriam Seoane Santos,et al.  Predicting Breast Cancer Recurrence Using Machine Learning Techniques , 2016, ACM Comput. Surv..

[3]  Phatak,et al.  Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[4]  Bo Yan,et al.  Data Possession Provability on Semi-trusted Cloud Storage , 2013, CloudComp.

[5]  Xiaoling Huang,et al.  A secure image encryption algorithm based on chaotic maps and SHA-3 , 2016, Secur. Commun. Networks.

[6]  Indranil Sengupta,et al.  Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud , 2018, IEEE Transactions on Cloud Computing.

[7]  Gaurav Somani,et al.  An Order Preserving Encryption Scheme for Cloud Computing , 2014, SIN.

[8]  Ilsun You,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..

[9]  Zongju Peng,et al.  Binary and Multi-Class Learning Based Low Complexity Optimization for HEVC Encoding , 2017, IEEE Transactions on Broadcasting.

[10]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[11]  Craig Gentry,et al.  Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.

[12]  Jianjun Lei,et al.  Adaptive Fractional-Pixel Motion Estimation Skipped Algorithm for Efficient HEVC Motion Estimation , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[13]  Carlos Eduardo S. Pires,et al.  Applying machine learning techniques for scaling out data quality algorithms in cloud computing environments , 2016, Applied Intelligence.

[14]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption , 2013 .

[15]  Indranil Sengupta,et al.  Accelerating Sorting of Fully Homomorphic Encrypted Data , 2013, INDOCRYPT.

[16]  J. Banks,et al.  On Devaney's definition of chaos , 1992 .

[17]  Julio C. Facelli,et al.  A review of the applications of data mining and machine learning for the prediction of biomedical properties of nanoparticles , 2016, Comput. Methods Programs Biomed..

[18]  Xiaoping Li,et al.  Scheduling for multi-stage applications with scalable virtual resources in cloud computing , 2017, Int. J. Mach. Learn. Cybern..

[19]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[20]  Ammasai Gounden Nanjappa Gounder,et al.  A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata , 2016, Secur. Commun. Networks.

[21]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Naixue Xiong,et al.  Analysis and Design of Digital Chaotic Systems With Desirable Performance via Feedback Control , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[23]  Jie Wang,et al.  Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .

[24]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[25]  Xiaofeng Liao,et al.  Period analysis of the Logistic map for the finite field , 2015, Science China Information Sciences.

[26]  Vinod Patidar,et al.  A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.

[27]  Junyuan Wang,et al.  A Machine Learning Framework for Resource Allocation Assisted by Cloud Computing , 2017, IEEE Network.

[28]  Indranil Sengupta,et al.  Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud , 2015, IACR Cryptol. ePrint Arch..

[29]  V. Sheng,et al.  An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .

[30]  Norbik Bashah Idris,et al.  Security risk assessment framework for cloud computing environments , 2014, Secur. Commun. Networks.

[31]  E. Lorenz Deterministic nonperiodic flow , 1963 .