DocumentCode
2021045
Title
Achieving usable and privacy-assured similarity search over outsourced cloud data
Author
Wang, Cong ; Ren, Kui ; Yu, Shucheng ; Urs, Karthik Mahendra Raje
Author_Institution
Dept. of ECE, Illinois Inst. of Technol., Chicago, IL, USA
fYear
2012
fDate
25-30 March 2012
Firstpage
451
Lastpage
459
Abstract
As the data produced by individuals and enterprises that need to be stored and utilized are rapidly increasing, data owners are motivated to outsource their local complex data management systems into the cloud for its great flexibility and economic savings. However, as sensitive cloud data may have to be encrypted before outsourcing, which obsoletes the traditional data utilization service based on plaintext keyword search, how to enable privacy-assured utilization mechanisms for outsourced cloud data is thus of paramount importance. Considering the large number of on-demand data users and huge amount of outsourced data files in cloud, the problem is particularly challenging, as it is extremely difficult to meet also the practical requirements of performance, system usability, and high-level user searching experiences. In this paper, we investigate the problem of secure and efficient similarity search over outsourced cloud data. Similarity search is a fundamental and powerful tool widely used in plaintext information retrieval, but has not been quite explored in the encrypted data domain. Our mechanism design first exploits a suppressing technique to build storage-efficient similarity keyword set from a given document collection, with edit distance as the similarity metric. Based on that, we then build a private trie-traverse searching index, and show it correctly achieves the defined similarity search functionality with constant search time complexity. We formally prove the privacy-preserving guarantee of the proposed mechanism under rigorous security treatment. To demonstrate the generality of our mechanism and further enrich the application spectrum, we also show our new construction naturally supports fuzzy search, a previously studied notion aiming only to tolerate typos and representation inconsistencies in the user searching input. The extensive experiments on Amazon cloud platform with real data set further demonstrate the validity and practicality of the p- oposed mechanism.
Keywords
cloud computing; computational complexity; cryptography; data privacy; document handling; fuzzy set theory; information retrieval; Amazon cloud platform; cloud data outsourcing; data management systems; data utilization service; document collection; edit distance; encryption; fuzzy search; plaintext information retrieval; plaintext keyword search; privacy-assured similarity search; privacy-assured utilization mechanisms; private trie-traverse searching index; sensitive cloud data; similarity metric; similarity search usability; storage-efficient similarity keyword set; suppressing technique; time complexity; Encryption; Indexes; Keyword search; Servers; Usability;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2012 Proceedings IEEE
Conference_Location
Orlando, FL
ISSN
0743-166X
Print_ISBN
978-1-4673-0773-4
Type
conf
DOI
10.1109/INFCOM.2012.6195784
Filename
6195784
Link To Document