SlideShare a Scribd company logo
Outsourced Similarity Search on

                             Metric Data Assets


Abstract—

This paper considers a cloud computing setting in which similarity querying of
metric data is outsourced to a service provider. The data is to be revealed only to
trusted users, not to the service provider or anyone else. Users query the server for
the most similar data objects to a query example. Outsourcing offers the data
owner scalability and a low-initial investment. The need for privacy may be due to
the data being sensitive (e.g., in medicine), valuable (e.g., in astronomy), or
otherwise confidential. Given this setting, the paper presents techniques that
transform the data prior to supplying it to the service provider for similarity queries
on the transformed data. Our techniques provide interesting trade-offs between
query cost and accuracy. They are then further extended to offer an intuitive
privacy guarantee. Empirical studies with real data demonstrate that the techniques
are capable of offering privacy while enabling efficient and accurate processing of
similarity queries.

Reasons for the proposal :

ADVANCES in digital measurement and engineering technologies enable the
capture of massive amounts of data in fields such as astronomy, medicine, and
seismology. The effort of data collection and processing, as well as its potential
utility for research or business, create value for the data owner. He wishes to store
them and allow access by himself, colleagues, and other (trusted) scientists or
customers. This can be supported by outsourced servers that offer low storage costs
for large databases. For instance, outsourcing based on cloud computing is
becoming increasingly attractive, as it promises pay-as-you-go, low storage costs
as well as easy data access. However, care needs to be taken to safeguard data that
are valuable or sensitive against unauthorized access.



Existing system & demerits:

In the literature, a number of concepts for securing databases have been studied.
Private information retrieval techniques hide the user’s query, e.g., the data item
searched for, but not the data being queried. To outsource valuable data to an
insecure server, such techniques are clearly not appropriate.

Digital watermarking         establishes the data owner’s identity on the data.
Additional information stored in the data helps prove ownership, but it cannot
prevent an attacker from illegally copying the data set.

Anonymization techniques secure data by releasing only a generalized version.
Aggregate statistical analysis is still possible on the generalized data, but the result
of a specific query is not guaranteed to be accurate.

Traditional encryption methods are capable of protecting the confidentiality of
the data. However, this also prevents users from querying the data on the untrusted
server. Obviously, transferring all the encrypted data to the query user for
searching takes outsourcing ad absurdum. Moreover, when services are made
available to users on a pay-asyou- go basis, the service providers are not interested
in such a brute force data transfer.

Proposed system :

The goal of this research is to develop a transformation method tðÞ for converting
an original object p in a metric space into another metric space object. First, the
data owner specifies a key value CK in order to define the instance of P to be used.
In a preprocessing phase, the data owner computes p0 for each object p and
uploads it to the server (i.e., service provider). At query time, the query user
specifies his query object q and then submits the transformed query object q0 to
the server for similarity search. The transformation method must satisfy these
requirements: . Even in the worst case that the attacker knows the inverse of P, he
can only estimate the original object p from the transformed object P with bounded
precision.

. It enables high-query accuracy.

. It enables efficient query processing in terms of communication cost.

. It supports insertion and deletion of objects.

Our contributions are as follows: We present three transformation techniques that
satisfy the above requirements. They represent various trade-offs among data
privacy and query cost and accuracy.

. In our first solution, we propose an encrypted index-based technique with perfect
privacy, but multiple communication rounds. This technique flexibly reduces
round trip latency at the expense of data transfer.

. For our second solution, our private anchor-based indexing guarantees the correct
answer within only 2 rounds of communication. Retrieval is accelerated by
bounding the range of potential nearest neighbors (NN) in the first phase.

. Our third solution limits communication to a single round, and also returns a
constant-sized candidate set by computing a close approximation of the query
result.

More Related Content

DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
A secure and dynamic multi keyword ranked
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search

What's hot (20)

PPTX
Final 1st
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
Enabling secure and efficient ranked keyword
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Mining Of Big Data Using Map-Reduce Theorem
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
K nearest neighbor classification over semantically secure encrypted relation...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
Final 1st
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling secure and efficient ranked keyword
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Mining Of Big Data Using Map-Reduce Theorem
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
K nearest neighbor classification over semantically secure encrypted relation...
Privacy preserving multi-keyword ranked search over encrypted cloud data
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
Ad

Similar to Outsourced similarity search on (20)

PDF
Cloud java titles adrit solutions
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
PDF
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
PDF
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
PDF
Enabling efficient multi keyword ranked
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
IRJET- Secure Data Access on Distributed Database using Skyline Queries
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
PDF
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Cloud java titles adrit solutions
Security Check in Cloud Computing through Third Party Auditor
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
International Journal of Engineering Research and Development (IJERD)
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
Enabling efficient multi keyword ranked
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET- Secure Data Access on Distributed Database using Skyline Queries
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Efficient Privacy Preserving Clustering Based Multi Keyword Search
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Ad

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Structure & Organelles in detailed.
PPTX
GDM (1) (1).pptx small presentation for students
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Complications of Minimal Access Surgery at WLH
Cell Structure & Organelles in detailed.
GDM (1) (1).pptx small presentation for students
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
TR - Agricultural Crops Production NC III.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPH.pptx obstetrics and gynecology in nursing
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.

Outsourced similarity search on

  • 1. Outsourced Similarity Search on Metric Data Assets Abstract— This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server for the most similar data objects to a query example. Outsourcing offers the data owner scalability and a low-initial investment. The need for privacy may be due to the data being sensitive (e.g., in medicine), valuable (e.g., in astronomy), or otherwise confidential. Given this setting, the paper presents techniques that transform the data prior to supplying it to the service provider for similarity queries on the transformed data. Our techniques provide interesting trade-offs between query cost and accuracy. They are then further extended to offer an intuitive privacy guarantee. Empirical studies with real data demonstrate that the techniques are capable of offering privacy while enabling efficient and accurate processing of similarity queries. Reasons for the proposal : ADVANCES in digital measurement and engineering technologies enable the capture of massive amounts of data in fields such as astronomy, medicine, and seismology. The effort of data collection and processing, as well as its potential utility for research or business, create value for the data owner. He wishes to store them and allow access by himself, colleagues, and other (trusted) scientists or customers. This can be supported by outsourced servers that offer low storage costs
  • 2. for large databases. For instance, outsourcing based on cloud computing is becoming increasingly attractive, as it promises pay-as-you-go, low storage costs as well as easy data access. However, care needs to be taken to safeguard data that are valuable or sensitive against unauthorized access. Existing system & demerits: In the literature, a number of concepts for securing databases have been studied. Private information retrieval techniques hide the user’s query, e.g., the data item searched for, but not the data being queried. To outsource valuable data to an insecure server, such techniques are clearly not appropriate. Digital watermarking establishes the data owner’s identity on the data. Additional information stored in the data helps prove ownership, but it cannot prevent an attacker from illegally copying the data set. Anonymization techniques secure data by releasing only a generalized version. Aggregate statistical analysis is still possible on the generalized data, but the result of a specific query is not guaranteed to be accurate. Traditional encryption methods are capable of protecting the confidentiality of the data. However, this also prevents users from querying the data on the untrusted server. Obviously, transferring all the encrypted data to the query user for searching takes outsourcing ad absurdum. Moreover, when services are made available to users on a pay-asyou- go basis, the service providers are not interested in such a brute force data transfer. Proposed system : The goal of this research is to develop a transformation method tðÞ for converting an original object p in a metric space into another metric space object. First, the
  • 3. data owner specifies a key value CK in order to define the instance of P to be used. In a preprocessing phase, the data owner computes p0 for each object p and uploads it to the server (i.e., service provider). At query time, the query user specifies his query object q and then submits the transformed query object q0 to the server for similarity search. The transformation method must satisfy these requirements: . Even in the worst case that the attacker knows the inverse of P, he can only estimate the original object p from the transformed object P with bounded precision. . It enables high-query accuracy. . It enables efficient query processing in terms of communication cost. . It supports insertion and deletion of objects. Our contributions are as follows: We present three transformation techniques that satisfy the above requirements. They represent various trade-offs among data privacy and query cost and accuracy. . In our first solution, we propose an encrypted index-based technique with perfect privacy, but multiple communication rounds. This technique flexibly reduces round trip latency at the expense of data transfer. . For our second solution, our private anchor-based indexing guarantees the correct answer within only 2 rounds of communication. Retrieval is accelerated by bounding the range of potential nearest neighbors (NN) in the first phase. . Our third solution limits communication to a single round, and also returns a constant-sized candidate set by computing a close approximation of the query result.