Optimizing encrypted search in the cloud using autoencoder-based query approximation
DOI:
https://doi.org/10.21123/bsj.2024.10215Keywords:
Autoencoder, Cloud security, Encrypted search, Homomorphic encryption, Query approximation, Searchable encryptionAbstract
Searching over encrypted data is critical for secure cloud services. However, encryption reduces search efficiency due to inability to directly compute on ciphertexts. This leads to an inherent tradeoff between privacy and usability that has motivated extensive research on enabling effective encrypted search. Recent work has explored using machine learning models like autoencoders to optimize similarity search under encryption. Autoencoders compress data into low-dimensional vectors capturing semantic information. Documents and queries can be encoded for efficient similarity computation without decryption. However, existing analysis remains limited in scope and scale. The research address these gaps through large-scale experiments and novel optimizations. Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. Comprehensive experiments are conducted on public datasets using cloud infrastructure to quantify accuracy, efficiency, and scalability. The research present an extensive study on optimizing encrypted search through query approximation with autoencoders. Our research contributes a systematic analysis of how different architectural and training choices impact performance. Additional novel techniques proposed include quantization to reduce computation and homomorphic encryption to prevent information leakage. Our work is comprehensively benchmarked against alternative methods to quantify gains. The open-source implementation enables further research into optimized neural encrypted search.
Received 15/11/2023
Revised 23/03/2024
Accepted 25/03/2024
Published Online First 20/06/2024
References
Shi Z, Fu X, Li X, Zhu K. ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption. IEEE Trans Knowl Data Eng. 2020: 1–1. https://doi.org/10.1109/tkde.2020.3025348 .
Meng F, Cheng L, Wang M. Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J Wirel Commun Netw. 2021; 2021. https://doi.org/10.1186/s13638-020-01875-2 .
Yuan X, Wang K, Lin J, Wang C, Yu PS. Privacy-preserving Deep Learning with SPDZ. Neur IPS. 2020. https://doi.org/10.48550/arXiv.2010.09582
Chen J, Dai W, Shi R, Li T, Weng J. HETE: Heterogeneous Autoencoder for Encrypted Textual Search in Cloud. IEEE Trans Parallel Distrib Syst. 2022; 33(3): 588-600. https://doi.org/10.1109/TPDS.2021.3111425
Li T, Chen J, Li Z, Weng J, Lee K, Deng RH. Building Confidential and Efficient Query Services in the Cloud with RASP Data. IEEE Trans Knowl Data Eng. 2020; 32(1): 141-153. https://doi.org/10.1109/TKDE.2018.2881661
Zhang Q, Luo T, Reiter MK. HEDGES: efficient homomorphic encryption based PIR for distributed log data. In: Proc ACM SIGSAC Conf Comput Commun Secur. 2019 (pp. 1583-1600). https://doi.org/10.1145/3319535.3363241
Brasser F, Sadeghi AR, Schneider T, Wehrenberg I. CHAMELEON: A Hybrid Secure Search Scheme over Encrypted Data. ACSAC 2019. https://doi.org/10.1145/3359789.3359790
Fu M, Ren K, Shao J, Zhang C. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Trans Inf Forensics Secur. 2019; 15: 1345-1358. https://doi.org/10.1109/TIFS.2019.2948660
Xu P, Jin H, Wu Q, Wang W. Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput. 2019 Nov 11; 68(11): 1630-42. https://doi.org/10.1109/TC.2019.2916786
Zhang Y, Chai Z, Fan P, Li K. Enabling efficient multi-keyword search with strong privacy over encrypted data in cloud. Concurr Comput Pract Exp. 2018 Feb 15; 30(17): e4321. https://doi.org/10.1002/cpe.4321
Chen Z, Luo C, Li S, Zhang Q, Chen L, Luo X. Quasi-Fully Homomorphic Encryption Scheme for Privacy-Preserving Neural Network. IEEE Trans Comput. 2022 Feb 14. https://doi.org/10.1109/TC.2022.3144433
Rathee D, Iyer RR, Chandran S, Gonggrijp R, Gupta I. Cryptflow2: Practical 2-party secure inference. In: Proc ACM SIGSAC Conf Comput Commun Secur. 2020 Oct (pp. 525-538). https://doi.org/10.1145/3372297.3417886
Yi X, Paulet R, Bertino E. Homomorphic encryption experiments on IBM's cloud quantum computing platform. IEEE Trans Emerg Top Comput. 2020 Apr 16.: https://doi.org/10.1109/TETC.2020.2986492
Chu C, Deng J, Zamani H, Wu J, Li S. Image retrieval with split augmented convolutional features. In: Proc IEEE/CVF Int Conf Comput Vis. 2019 (pp. 9543-51).project n.d. (accessed February 3, 2024).
Zhan H, Sheng VS. Privacy-Preserving Representation Learning for Text-Attributed Networks with Simplicial Complexes. Proc AAAI Conf Artif Intell. 2023; 37: 16143–4. https://doi.org/10.1609/aaai.v37i13.26932
Li T, Xiao X, Lu Y, Zhou L. Search me if you can: privacy-preserving location query over encrypted data. In: Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. https://doi.org/10.1109/INFOCOM.2018.8485905
Wotaifi TA, Dhannoon BN. An Effective Hybrid Deep Neural Network for Arabic Fake News Detection. Baghdad Sci. J. 2023; 20(4): 1392-1401. https://doi.org/10.21123/bsj.2023.7427
Esquivel JA, Li D. Lightweight and Personalized E-commerce Recommendation based on Collaborative Filtering and LSH. International Journal of Ad Hoc and Ubiquitous Computing 2024;45. https://doi.org/10.1504/ijahuc.2024.10059174 .
Hassan FO, Samir NM, Hanapi ZM. Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator. Baghdad Science Journal 2023. https://doi.org/10.21123/bsj.2023.7161 .
Yang R, Wang S, Gu Y, Wang J, Sun Y, Zhang H. Continual learning for cross-modal image-text retrieval based on domain-selective attention. Pattern Recognition 2024; 149:110273. https://doi.org/10.1016/j.patcog.2024.110273 .
Yadav C, Yadav V, Kumar J. Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment. International Journal of Electrical and Electronics Research 2021;9:48–56. https://doi.org/10.37391/ijeer.090305 .
A. A, Saleh S, Elkafrawy P. Searching Techniques over Encrypted Cloud Data. International Journal of Computer Applications 2019;181:25–30. https://doi.org/10.5120/ijca2019918676 .
Cui S, Song X, Asghar MR, Galbraith SD, Russello G. Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Transactions on Privacy and Security 2021; 24:1–35. https://doi.org/10.1145/3446920 .
Zhu D, Zhu H, Wang X, Lu R, Feng D. Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data. IEEE Trans Cloud Comput. 2023; 11: 1286–302. https://doi.org/10.1109/tcc.2021.3131287 .
Lu H, Chen J, Ning J, Zhang K. Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy. Comput J. 2022; 66(10): 2379–92. https://doi.org/10.1093/comjnl/bxac084 .
Downloads
Issue
Section
License
Copyright (c) 2024 Mahmoud Mohamed, Khaled Alosman
This work is licensed under a Creative Commons Attribution 4.0 International License.