z-logo
open-access-imgOpen Access
OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
Author(s) -
Zeeshan Pervez,
Mahmood Ahmad,
Asad Masood Khattak,
Naeem Ramzan,
Wajahat Ali Khan
Publication year - 2017
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0179720
Subject(s) - bloom filter , encryption , computer science , homomorphic encryption , cloud computing , information retrieval , nearest neighbor search , filter (signal processing) , matching (statistics) , cryptography , search engine indexing , database , data mining , computer security , algorithm , mathematics , statistics , computer vision , operating system
Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search (O S 2) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies,O S 2ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enablesO S 2to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy ofO S 2is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here