Verifiable privacy-preserving semantic retrieval scheme in the edge computing

被引:0
|
作者
Guo, Jiaqi [1 ,2 ]
Tian, Cong [1 ,2 ]
He, Qiang [3 ,4 ]
Zhao, Liang [1 ,2 ]
Duan, Zhenhua [1 ,2 ]
机构
[1] Xidian Univ, ICTT Lab, Xian 710071, Peoples R China
[2] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
[3] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Secure semantic retrieval; Secure kNN based on LWE; Result verification; Edge computing; SEARCHABLE ENCRYPTION;
D O I
10.1016/j.sysarc.2024.103289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data outsourcing and retrieval. However, data outsourcing poses risks to data privacy. Although searchable encryption is proposed to secure search of outsourced data, existing schemes generally cannot meet the requirements of semantic search, and they also exhibit security risks and incur high search costs. In addition, edge servers may engage in malicious activities such as data tampering or forgery. Therefore, we propose a verifiable privacy-preserving semantic retrieval scheme named VPSR suitable for edge computing environments. We utilize the Doc2Vec method to extract text feature vectors and then convert them into matrix form to reduce storage space requirements for indexes, queries, and keys. We encrypt matrices using an improved secure k-nearest neighbor (kNN) algorithm based on learning with errors (LWE) and calculate text similarity by solving the Hadamard product between matrices. Additionally, we design an aggregable signature scheme and offload part of the result verification tasks to edge servers. Security and performance analysis results demonstrate that the VPSR scheme is suitable for edge computing environments with high encryption and search efficiency and low storage cost while ensuring security.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] PASTEL: Privacy-Preserving Federated Learning in Edge Computing
    Elhattab, Fatima
    Bouchenak, Sara
    Boscher, Cedric
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2023, 7 (04):
  • [42] Lightweight Privacy-Preserving Equality Query in Edge Computing
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Feng, Da
    Li, Bao
    IEEE ACCESS, 2019, 7 : 182588 - 182599
  • [43] LPDA-EC: A Lightweight Privacy-Preserving Data Aggregation Scheme for Edge Computing
    Zhang, Jiale
    Zhao, Yanchao
    Wu, Jie
    Chen, Bing
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 98 - 106
  • [44] Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing
    Li, Hongyang
    Cheng, Qingfeng
    Li, Xinghua
    Ma, Siqi
    Ma, Jianfeng
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1832 - 1841
  • [45] EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases
    Cheng, Jingxian
    Qi, Saiyu
    Qi, Yong
    Wang, Jianfeng
    Jiang, Qin
    Wu, Di
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1306 - 1311
  • [46] Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing
    Ma, Zhuoran
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Yang, Ruikang
    Wang, Xiangyu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) : 1606 - 1618
  • [47] A blockchain-based conditional privacy-preserving authentication scheme for edge computing servicesd
    Wang, Yifan
    Jia, Xiaoying
    Xia, Yongbo
    Khan, Muhammad Khurram
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [48] Privacy-preserving searchable encryption in the intelligent edge computing
    Chen, Qi
    Fan, Kai
    Zhang, Kuan
    Wang, Haoyang
    Li, Hui
    Yang, Yingtang
    COMPUTER COMMUNICATIONS, 2020, 164 : 31 - 41
  • [49] Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by Medical Edge Computing
    Lai, Chengzhe
    Wan, Jinke
    Zheng, Dong
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 154 - 159
  • [50] Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing
    Han, Song
    Ma, Hui
    Taherkordi, Amir
    Lan, Dapeng
    Chen, Yange
    IET COMMUNICATIONS, 2024, 18 (07) : 461 - 476