Cargando…

[Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain

Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further com...

Descripción completa

Detalles Bibliográficos
Autores principales: Pervez, Zeeshan, Ahmad, Mahmood, Khattak, Asad Masood, Ramzan, Naeem, Khan, Wajahat Ali
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5503255/
https://www.ncbi.nlm.nih.gov/pubmed/28692697
http://dx.doi.org/10.1371/journal.pone.0179720
_version_ 1783249064657158144
author Pervez, Zeeshan
Ahmad, Mahmood
Khattak, Asad Masood
Ramzan, Naeem
Khan, Wajahat Ali
author_facet Pervez, Zeeshan
Ahmad, Mahmood
Khattak, Asad Masood
Ramzan, Naeem
Khan, Wajahat Ali
author_sort Pervez, Zeeshan
collection PubMed
description Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search ([Image: see text] ) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, [Image: see text] ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables [Image: see text] to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of [Image: see text] is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.
format Online
Article
Text
id pubmed-5503255
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-55032552017-07-25 [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain Pervez, Zeeshan Ahmad, Mahmood Khattak, Asad Masood Ramzan, Naeem Khan, Wajahat Ali PLoS One Research Article Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search ([Image: see text] ) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, [Image: see text] ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables [Image: see text] to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of [Image: see text] is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations. Public Library of Science 2017-07-10 /pmc/articles/PMC5503255/ /pubmed/28692697 http://dx.doi.org/10.1371/journal.pone.0179720 Text en © 2017 Pervez et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Pervez, Zeeshan
Ahmad, Mahmood
Khattak, Asad Masood
Ramzan, Naeem
Khan, Wajahat Ali
[Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title_full [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title_fullStr [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title_full_unstemmed [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title_short [Image: see text] : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
title_sort [image: see text] : oblivious similarity based searching for encrypted data outsourced to an untrusted domain
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5503255/
https://www.ncbi.nlm.nih.gov/pubmed/28692697
http://dx.doi.org/10.1371/journal.pone.0179720
work_keys_str_mv AT pervezzeeshan imageseetextoblivioussimilaritybasedsearchingforencrypteddataoutsourcedtoanuntrusteddomain
AT ahmadmahmood imageseetextoblivioussimilaritybasedsearchingforencrypteddataoutsourcedtoanuntrusteddomain
AT khattakasadmasood imageseetextoblivioussimilaritybasedsearchingforencrypteddataoutsourcedtoanuntrusteddomain
AT ramzannaeem imageseetextoblivioussimilaritybasedsearchingforencrypteddataoutsourcedtoanuntrusteddomain
AT khanwajahatali imageseetextoblivioussimilaritybasedsearchingforencrypteddataoutsourcedtoanuntrusteddomain