• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Guo, Cheng (Guo, Cheng.) [1] | Liu, Wanping (Liu, Wanping.) [2] | Liu, Ximeng (Liu, Ximeng.) [3] | Zhang, Yinghui (Zhang, Yinghui.) [4]

Indexed by:

EI

Abstract:

Searchable symmetric encryption (SSE) enables a user to outsource a private dataset to a cloud server in encrypted form while retaining the ability to search over the encrypted outsourced data. The existing SSE schemes improve the search and safety performances from different perspectives. However, almost none of the existing SSE schemes considers the data distribution issues. We find that when the dataset is not distributed uniformly, the search quality based on the conventional methods decreases. Therefore, the existing SSE schemes cannot guarantee high search quality when faced with non-uniform datasets. In addition, most existing SSE solutions cannot hide the distribution of the query set. In this article, we design a Secure similarity search over Encrypted Non-uniform and high-dimensional Datasets (SEND) with a novel way to enhance security. The basic idea is to combine SSE with locality-sensitive hashing (LSH). Unlike earlier schemes, SEND uses selective hashing, which has better performance for non-uniform datasets. Also, we present a novel approach to hide the distribution of the query set, which makes SEND more secure. Our experimental results indicate SEND achieves a high search quality of recall and precision, and it is proven secure against adaptively chosen query attacks in the standard model. © 2013 IEEE.

Keyword:

Cryptography

Community:

  • [ 1 ] [Guo, Cheng]Dalian University of Technology, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, School of Software Technology, Dalian, Liaoning; 116620, China
  • [ 2 ] [Liu, Wanping]Dalian University of Technology, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, School of Software Technology, Dalian, Liaoning; 116620, China
  • [ 3 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Fujian, Fuzhou; 350000, China
  • [ 4 ] [Liu, Ximeng]Fujian Provincial Key Laboratory of Information Security of Network Systems, Fujian, Fuzhou; 350000, China
  • [ 5 ] [Zhang, Yinghui]Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, Xi'an, Shaanxi; 710121, China
  • [ 6 ] [Zhang, Yinghui]Westone Cryptologic Research Center, Beijing; 100070, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Cloud Computing

Year: 2022

Issue: 3

Volume: 10

Page: 2102-2117

6 . 5

JCR@2022

5 . 3 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:285/10037258
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1