Verifiable privacy-preserving semantic retrieval scheme in the edge computing

被引:0
|
作者
Guo, Jiaqi [1 ,2 ]
Tian, Cong [1 ,2 ]
He, Qiang [3 ,4 ]
Zhao, Liang [1 ,2 ]
Duan, Zhenhua [1 ,2 ]
机构
[1] Xidian Univ, ICTT Lab, Xian 710071, Peoples R China
[2] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
[3] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Secure semantic retrieval; Secure kNN based on LWE; Result verification; Edge computing; SEARCHABLE ENCRYPTION;
D O I
10.1016/j.sysarc.2024.103289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data outsourcing and retrieval. However, data outsourcing poses risks to data privacy. Although searchable encryption is proposed to secure search of outsourced data, existing schemes generally cannot meet the requirements of semantic search, and they also exhibit security risks and incur high search costs. In addition, edge servers may engage in malicious activities such as data tampering or forgery. Therefore, we propose a verifiable privacy-preserving semantic retrieval scheme named VPSR suitable for edge computing environments. We utilize the Doc2Vec method to extract text feature vectors and then convert them into matrix form to reduce storage space requirements for indexes, queries, and keys. We encrypt matrices using an improved secure k-nearest neighbor (kNN) algorithm based on learning with errors (LWE) and calculate text similarity by solving the Hadamard product between matrices. Additionally, we design an aggregable signature scheme and offload part of the result verification tasks to edge servers. Security and performance analysis results demonstrate that the VPSR scheme is suitable for edge computing environments with high encryption and search efficiency and low storage cost while ensuring security.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
    Zhang, Jiale
    Liu, Yue
    Wu, Di
    Lou, Shuai
    Chen, Bing
    Yu, Shui
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (04) : 981 - 989
  • [2] VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems
    Jiale Zhang
    Yue Liu
    Di Wu
    Shuai Lou
    Bing Chen
    Shui Yu
    Digital Communications and Networks, 2023, 9 (04) : 981 - 989
  • [3] A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment br
    Zhang, Yiran
    Geng, Huizheng
    Xu, Yanyan
    Su, Li
    Liu, Fei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (02): : 450 - 470
  • [4] A Lightweight Privacy-Preserving Ciphertext Retrieval Scheme Based on Edge Computing
    Wang, Na
    Zhou, Wen
    Han, Qingyun
    Liu, Jianwei
    Liao, Weilue
    Fu, Junsong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (04) : 1273 - 1290
  • [5] Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing
    Zhou, Hao
    Yang, Geng
    Huang, Yuxian
    Dai, Hua
    Xiang, Yang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 565 - 580
  • [6] A Privacy-Preserving and Verifiable Federated Learning Scheme
    Zhang, Xianglong
    Fu, Anmin
    Wang, Huaqun
    Zhou, Chunyi
    Chen, Zhenzhu
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] Privacy-Preserving Multi-Source Image Retrieval in Edge Computing
    Yan, Yuejing
    Xu, Yanyan
    Wang, Zhiheng
    Ouyang, Xue
    Zhang, Bo
    Rao, Zheheng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2892 - 2907
  • [8] An efficient privacy-preserving and verifiable scheme for federated learning
    Yang, Xue
    Ma, Minjie
    Tang, Xiaohu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 160 : 238 - 250
  • [9] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Zhang, Xiaoyu
    Chen, Xiaofeng
    Wang, Jianfeng
    Zhan, Zhihui
    Li, Jin
    SOFT COMPUTING, 2018, 22 (23) : 7719 - 7732
  • [10] A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs
    Li, Xiong
    He, Jiabei
    Vijayakumar, Pandi
    Zhang, Xiaosong
    Chang, Victor
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) : 5494 - 5503