Verifiable privacy-preserving semantic retrieval scheme in the edge computing

被引:0
|
作者
Guo, Jiaqi [1 ,2 ]
Tian, Cong [1 ,2 ]
He, Qiang [3 ,4 ]
Zhao, Liang [1 ,2 ]
Duan, Zhenhua [1 ,2 ]
机构
[1] Xidian Univ, ICTT Lab, Xian 710071, Peoples R China
[2] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
[3] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Secure semantic retrieval; Secure kNN based on LWE; Result verification; Edge computing; SEARCHABLE ENCRYPTION;
D O I
10.1016/j.sysarc.2024.103289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data outsourcing and retrieval. However, data outsourcing poses risks to data privacy. Although searchable encryption is proposed to secure search of outsourced data, existing schemes generally cannot meet the requirements of semantic search, and they also exhibit security risks and incur high search costs. In addition, edge servers may engage in malicious activities such as data tampering or forgery. Therefore, we propose a verifiable privacy-preserving semantic retrieval scheme named VPSR suitable for edge computing environments. We utilize the Doc2Vec method to extract text feature vectors and then convert them into matrix form to reduce storage space requirements for indexes, queries, and keys. We encrypt matrices using an improved secure k-nearest neighbor (kNN) algorithm based on learning with errors (LWE) and calculate text similarity by solving the Hadamard product between matrices. Additionally, we design an aggregable signature scheme and offload part of the result verification tasks to edge servers. Security and performance analysis results demonstrate that the VPSR scheme is suitable for edge computing environments with high encryption and search efficiency and low storage cost while ensuring security.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing
    Gu, Bruce
    Gao, Longxiang
    Wang, Xiaodong
    Qu, Youyang
    Jin, Jiong
    Yu, Shui
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2298 - 2309
  • [32] A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination
    Kong, Qinglei
    Lu, Rongxing
    Ma, Maode
    Bao, Haiyong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) : 1877 - 1887
  • [33] Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest
    Hou, Jinpeng
    Su, Mang
    Fu, Anmin
    Yu, Yan
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22158 - 22172
  • [34] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [35] Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV
    Sun, Youwang
    Jin, Chunhua
    Liu, Xinying
    Kong, Lingwen
    Yu, Changhui
    Chen, Guanhua
    Chen, Liqing
    PERVASIVE AND MOBILE COMPUTING, 2025, 107
  • [36] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [37] Dual Scheme Privacy-Preserving Approach for Location-Aware Application in Edge Computing
    Gu, Bruce
    Qu, Youyang
    Ahmed, Khandakar
    Ye, Wenjie
    Tan, Chenchen
    Miao, Yuan
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 301 - 316
  • [38] A Note on Verifiable Privacy-Preserving Tries
    Kissel, Zachary A.
    Wang, Jie
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 942 - 943
  • [39] A verifiable and privacy-preserving multidimensional data aggregation scheme in mobile crowdsensing
    Jiang, Yun
    Zhao, Bowen
    Tang, Shaohua
    Wu, Hao-Tian
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [40] An effective and verifiable secure aggregation scheme with privacy-preserving for federated learning
    Wang, Rong
    Xiong, Ling
    Geng, Jiazhou
    Xie, Chun
    Li, Ruidong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 161