Searchable Encryption over Feature-Rich Data

Qian Wang, Meiqi He, Minxin Du, Sherman S.M. Chow, Russell W.F. Lai, Qin Zou

Research output: Journal article publicationJournal articleAcademic researchpeer-review

134 Citations (Scopus)

Abstract

Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, many schemes construct indexes based on keyword-file pairs and focus on boolean expressions of exact keyword matches. Moreover, most dynamic SSE schemes cannot achieve forward privacy and reveal unnecessary information when updating the encrypted databases. We tackle the challenge of supporting large-scale similarity search over encrypted feature-rich multimedia data, by considering the search criteria as a high-dimensional feature vector instead of a keyword. Our solutions are built on carefully-designed fuzzy Bloom filters which utilize locality sensitive hashing (LSH) to encode an index associating the file identifiers and feature vectors. Our schemes are proven to be secure against adaptively chosen query attack and forward private in the standard model. We have evaluated the performance of our scheme on real-world high-dimensional datasets, and achieved a search quality of 99 percent recall with only a few number of hash tables for LSH. This shows that our index is compact and searching is not only efficient but also accurate.

Original languageEnglish
Pages (from-to)496-510
Number of pages15
JournalIEEE Transactions on Dependable and Secure Computing
Volume15
Issue number3
DOIs
Publication statusPublished - 1 May 2018

Keywords

  • Cloud storage
  • homomorphic encryption
  • proximity search
  • searchable encryption
  • similarity search

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Searchable Encryption over Feature-Rich Data'. Together they form a unique fingerprint.

Cite this