{"title":"外包云上高效、安全、可验证的KNN集相似性搜索","authors":"Xufeng Jiang , Lu Li","doi":"10.1016/j.hcc.2022.100100","DOIUrl":null,"url":null,"abstract":"<div><p>KNN set similarity search is a foundational operation in various realistic applications in cloud computing. However, for security consideration, sensitive data will always be encrypted before uploading to the cloud servers, which makes the search processing a challenging task. In this paper, we focus on the problem of KNN set similarity search over the encrypted datasets. We use Yao’s garbled circuits and secret sharing as underlying tools. To achieve better querying efficiency, we construct a secure R-Tree index structure based on a novel secure grouping protocol, which enables grouping appropriate private values in an oblivious way. Along with several elaborately designed secure arithmetic subroutines, we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds. Theoretically, we analyze the complexity of our schemes in detail, and prove the security in the presence of semi-honest adversaries. Finally, we evaluate the performance and feasibility of our proposed methods by extensive experiments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 1","pages":"Article 100100"},"PeriodicalIF":3.2000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Efficient secure and verifiable KNN set similarity search over outsourced clouds\",\"authors\":\"Xufeng Jiang , Lu Li\",\"doi\":\"10.1016/j.hcc.2022.100100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>KNN set similarity search is a foundational operation in various realistic applications in cloud computing. However, for security consideration, sensitive data will always be encrypted before uploading to the cloud servers, which makes the search processing a challenging task. In this paper, we focus on the problem of KNN set similarity search over the encrypted datasets. We use Yao’s garbled circuits and secret sharing as underlying tools. To achieve better querying efficiency, we construct a secure R-Tree index structure based on a novel secure grouping protocol, which enables grouping appropriate private values in an oblivious way. Along with several elaborately designed secure arithmetic subroutines, we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds. Theoretically, we analyze the complexity of our schemes in detail, and prove the security in the presence of semi-honest adversaries. Finally, we evaluate the performance and feasibility of our proposed methods by extensive experiments.</p></div>\",\"PeriodicalId\":100605,\"journal\":{\"name\":\"High-Confidence Computing\",\"volume\":\"3 1\",\"pages\":\"Article 100100\"},\"PeriodicalIF\":3.2000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High-Confidence Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667295222000526\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295222000526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Efficient secure and verifiable KNN set similarity search over outsourced clouds
KNN set similarity search is a foundational operation in various realistic applications in cloud computing. However, for security consideration, sensitive data will always be encrypted before uploading to the cloud servers, which makes the search processing a challenging task. In this paper, we focus on the problem of KNN set similarity search over the encrypted datasets. We use Yao’s garbled circuits and secret sharing as underlying tools. To achieve better querying efficiency, we construct a secure R-Tree index structure based on a novel secure grouping protocol, which enables grouping appropriate private values in an oblivious way. Along with several elaborately designed secure arithmetic subroutines, we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds. Theoretically, we analyze the complexity of our schemes in detail, and prove the security in the presence of semi-honest adversaries. Finally, we evaluate the performance and feasibility of our proposed methods by extensive experiments.