Contextual Oblivious Similarity Searching for Encrypted Data on Cloud Storage Services

With the development of collaborative cloud storage services, files have been typically stored and secured through encryption making them hard to retrieve and search. Search over encrypted cloud approaches have consequently been utilizing cryptographic and indexing procedures. The vast majority use exact matching to fulfill their search criteria, which is then expanded by incorporating similarity ranking algorithms. However, this complex expansion does not always succeed due to its dependence on third parties to evaluate the search and the possible compromise on the privacy of the stored information. It also requires significant computational resources. This work demonstrates novel approach to similarity search, known as Contextual Oblivious Similarity based Search (COS2). In the proposed system, authorized users can categories searches resilient to typing errors. COS2 also introduces browsing caches to improve subscriber experience. Dual encryption mechanisms improve the relevance in searches without revealing confidential data on untrusted cloud service providers. Finally, this contextual search thrives to reduce the computational overhead of the overall search procedure, leading to a 86% improvement in terms of search efficiency.

[1]  Charalampos Papamanthou,et al.  CS2: A Searchable Cryptographic Cloud Storage System , 2011 .

[2]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[3]  Sungyoung Lee,et al.  Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services , 2016, PloS one.

[4]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Horacio González-Vélez,et al.  Streaming Dynamic Coarse-Grained CPU/GPU Workloads with Heterogeneous Pipelines in FastFlow , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[9]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Derek Greene,et al.  Practical solutions to the problem of diagonal dominance in kernel document clustering , 2006, ICML.

[11]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[12]  Qiang Tang Search in Encrypted Data: Theoretical Models and Practical Applications , 2012, IACR Cryptol. ePrint Arch..

[13]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[14]  Xingming Sun,et al.  Semantic-Aware Searching Over Encrypted Data for Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[15]  Horacio González-Vélez,et al.  Automated Instantiation of Heterogeneous Fast Flow CPU/GPU Parallel Pattern Applications in Clouds , 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[16]  Wajahat Ali Khan,et al.  OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain , 2017, PloS one.

[17]  Piotr Indyk,et al.  Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.

[18]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[19]  David Sánchez,et al.  Privacy-preserving data outsourcing in the cloud via semantic data splitting , 2017, Comput. Commun..

[20]  Bo Lang,et al.  Semantic-based Compound Keyword Search over Encrypted Cloud Data , 2019 .

[21]  JUSTIN ZOBEL,et al.  Inverted files for text search engines , 2006, CSUR.