Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

Full metadata record
DC Field Value Language
dc.contributor.authorHahn, Changhee-
dc.contributor.authorShin, Hyung June-
dc.contributor.authorKwon, Hyunsoo-
dc.contributor.authorHur, Junbeom-
dc.date.accessioned2021-09-01T10:02:58Z-
dc.date.available2021-09-01T10:02:58Z-
dc.date.created2021-06-19-
dc.date.issued2019-08-
dc.identifier.issn0929-6212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/63588-
dc.description.abstractIn cloud-assisted data outsourcing systems, the privacy of sensitive data is a major concern. Thus, data are uploaded in encrypted form in many cloud applications while providing some basic yet critical functionalities, such as the ability to search. Similarity search over encrypted data provides decryptionless similarity testing between data and search queries which are encrypted by the data owner and users, respectively. However, previous similarity search schemes supporting multi-user settings incur unreasonable communication costs between the users and data owners during the search. In this paper, we propose efficient multi-user similarity search schemes for cloud storage. Specifically, the proposed schemes enable flexible similarity searches over encrypted data even when the given data have different format, encoding, or editing. The proposed similarity search schemes can guarantee asymptotically optimal performance for multi-user settings. We rigorously prove the proposed schemes are adaptively semantic secure. We also conduct an experimental analysis to demonstrate the applicability of the proposed scheme in practical cloud systems.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectPUBLIC-KEY ENCRYPTION-
dc.subjectKEYWORD SEARCH-
dc.titleEfficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage-
dc.typeArticle-
dc.contributor.affiliatedAuthorHur, Junbeom-
dc.identifier.doi10.1007/s11277-018-5744-z-
dc.identifier.scopusid2-s2.0-85045426406-
dc.identifier.wosid000477606900001-
dc.identifier.bibliographicCitationWIRELESS PERSONAL COMMUNICATIONS, v.107, no.3, pp.1337 - 1353-
dc.relation.isPartOfWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.titleWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.volume107-
dc.citation.number3-
dc.citation.startPage1337-
dc.citation.endPage1353-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordPlusKEYWORD SEARCH-
dc.subject.keywordAuthorSimilarity search-
dc.subject.keywordAuthorSearchable encryption-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorCloud computing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE