Skip to main content
Log in

Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Cloud storage is widely used in massive data outsourcing, but how to efficiently query encrypted multidimensional data stored in an untrusted cloud environment remains a research challenge. We propose a high performance and privacy-preserving query (pLSH-PPQ) scheme over encrypted multidimensional data to address this challenge. In our scheme, for a given query, the proxy server will return K top similar data object identifiers. An enhanced Ciphertext-Policy Attribute-Based Encryption (CP-ABE) policy is used to control access to the search results. Therefore, only the requester with the permission attribute can obtain correct secret keys to decrypt the data. Security analysis proves that the pLSH-PPQ scheme achieves data confidentiality and reserves the data owner’s privacy in a semi-trusted cloud. In addition, evaluations demonstrate that the pLSH-PPQ scheme can significantly reduce response time and provide high search efficiency without compromising on search quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]//Security and Privacy, 2000 S&P 2000 Proceedings 2000 IEEE Symposium on. Washington D C: IEEE, 2002:44–52.

    Google Scholar 

  2. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] //ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89–98.

    Google Scholar 

  3. Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing[C]//INFOCOM, 2010 Proceedings IEEE. Piscataway: IEEE, 2010:1–5.

    Google Scholar 

  4. Agrawal R, Kiernan J, Srikant R, et al. Order preserving encryption for numeric data[C]//ACM SIGMOD International Conference on Management of Data. New York: ACM, 2004: 563–574.

    Google Scholar 

  5. Har-Peled S, Indyk P, Motwani R. Approximate nearest neighbor: Towards removing the curse of dimensionality[J]. Theory of Computing, 2000, (11): 604–613.

    Google Scholar 

  6. Datar M, Immorlica N, Indyk P, et al. Locality-sensitive hashing scheme based on p-stable distributions[C]//Twentieth Symposium on Computational Geometry. New York: ACM, 2004: 253–262.

    Chapter  Google Scholar 

  7. Zhao Y W, Li B C. Object retrieval based on exact euclidean locality sensitive hashing[J]. Journal of Applied Sciences, 2012, 30(4): 349–355(Ch).

    Google Scholar 

  8. Andoni A, Indyk P. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions[C]//IEEE Symposium on Foundations of Computer Science. Piscataway: IEEE, 2006:459–468.

    Google Scholar 

  9. Motwani R, Naor A, Panigrahy R. Lower bounds on locality sensitive hashing[J]. Siam Journal on Discrete Mathematics, 2005, 21(4): 154–157.

    Google Scholar 

  10. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]//Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321–334.

    Google Scholar 

  11. Nolan J P. Stable Distributions: Models for Heavy-Tailed Data[M]. Boston: Birkhauser, 2005.

    Google Scholar 

  12. Zolotarev V M, One-Dimensional Stable Distributions[M]. Washington: Mathematical Society, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangli Xiang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61303029)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiang, G., Lin, X., Wang, H. et al. Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage. Wuhan Univ. J. Nat. Sci. 23, 163–170 (2018). https://doi.org/10.1007/s11859-018-1306-1

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-018-1306-1

Key words

CLC number

Navigation