Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia cloud is novel computation paradigm which could leverage cloud infrastructure to store large quantity of multimedia documents and respond on the requests from customers. With the development of multimedia cloud, an increasing attention is paid to its privacy and security issues. Searchable encryption (SE) technology could protect the sensitive information of cloud storage data and at the same time allow keyword search query. Most of the available SE schemes are constructed using the bilinear map. However, both discrete logarithms and factorization are proved to be solved by quantum computer in a polynomial time. Thus, those schemes are not secure in quantum age. Moreover, majority SE schemes are limited in exact or fuzzy keyword search. They can not support the semantically keyword equivalent judgement. In order to solve those problems, we suggest a novel data retrieval scheme for multiple users based on the lattice based mechanism. The contribution of this paper is summarized in three aspects: lattice assumption based scheme to resist quantum attack, semantically keyword search to enable synonym query and broadcast encryption based mechanism to support multiple user system without sharing secret key. This scheme is a candidate for secure multimedia cloud even in quantum-era since the LWE problem is secure against quantum attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h)IBE in the standard model Eurocrypt, vol 6110, pp 553–572

  2. Agrawal S, Boneh D, Boyen X (2010) Lattice basis delegation in fixed dimension and shorter-ciphtertext Hierarchical IBE. In: Crypto, vol 6223, pp 98–115

  3. Alwen J, Peikert C (2009) Generating shorter bases for hard random lattices. In: STACS, pp 75–86

  4. Baek J, Safavi-Naini R, SusiloW(2008) Public key encryption with keyword search revisited. In: ICCSA 2008, Part I. LNCS. Springer, Heidelberg, vol 5072, pp 1249–1259

    Google Scholar 

  5. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE transactions on parallel and distributed systems. IEEE, vol 25, no 1, pp 222–233

  6. Cash D, Hofheinz D, Kiltz E (2009) How to delegate a lattice basis. Cryptology ePrint Archive Report 2009/351. http://eprint.iacr.org/2009/351

  7. Chang V (2014) The business intelligence as a service in the cloud [J]. Futur Gener Comput Syst 37:512–534

    Article  Google Scholar 

  8. Chang V (2015) Towards a Big Data system disaster recovery in a Private Cloud [J]. Ad Hoc Netw 35:65–82

    Article  Google Scholar 

  9. Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework [J]. IEEE Trans Serv Comput 9(1):138–151

    Article  Google Scholar 

  10. Chen Z, Wu C, Wang D, Li S (2012) Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor. In: PAISI2012. IEEE, pp 176–189

  11. Delerable C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in cryptology-ASIACRYPT 2007. Springer Berlin Heidelberg, pp 200–215

  12. Diaz-Sanchez D et al (2014) Media Gateway: bringing privacy to private multimedia cloud connections. Telecommun Syst 55.2:315–330

    Article  Google Scholar 

  13. Ding M, Gao F, Jin Z, Zhang H (2012) An efficient public key encryption with conjunctive keyword search scheme based on pairings. In: IC-NIDC2012. IEEE, pp 526–530

  14. Gentry C, Halevi S, Vaikuntanathan V (2010) A simple BGN-type cryptosystem from LWE Eurocrypt, vol 6110, pp 506–522

  15. Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions STOC, pp 197–206

  16. Goldwasser S, Kalai Y, Peikert C, Vaikuntanathan V (2010) Robustness of the learning with errors assumption ICS, pp 230–240

  17. Gordon SD, Katz JJ, Vaikuntanathan V (2010) A group signature scheme from lattice assumptions ASIACRYPT, vol 6477, pp 395–412

  18. Gu C, Guang Y, Zhu Y, Zheng Y (2013) Public key encryption with keyword search from lattices International journal of information technology, vol 19, no 1

  19. Hou C, Liu F, Bai H, Ren L (2013) Public key encryption with keyword search from lattice. In: 2013 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp 336–339, IEEE

  20. Hu C, He P, Liu P (2012) Public key encryption with multi-keyword search NCIS2012, pp 568–576, Springer

  21. Hwang M, Hsu S, Lee C (2014) A new public key encryption with conjunctive field keyword search scheme Information technology and control, vol 43, no 3, pp 277–288

  22. Kang L-W et al (2012) Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation. In: 2012 international conference on information security and intelligence control (ISIC). IEEE

  23. Li Yibin et al (2016) Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 12.4s:67

    Google Scholar 

  24. Peikert C (2009) Public-Key Cryptosystems from the Worst-Case shortest vector problem STOC, pp 333–342

  25. Regev O (2005) On lattices, learning with errors, random linear codes, and cryptography STOC, pp 84–93

  26. Troncoso-Pastoriza JR, Perez-Gonzalez F (2013) Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Proc Mag 30.2:29–41

    Article  Google Scholar 

  27. Wang H et al (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52.3:73–79

    Article  Google Scholar 

  28. WordNet Documentation[EB/OL]. http://wordnet.princeton.edu/wordnet/documentation/

  29. Xu P, Jin H, Wu Q, et al (2013) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack[J]. IEEE Trans Comput 62(11):2266–2277

    Article  MathSciNet  MATH  Google Scholar 

  30. Yang T-C et al (2016) A secure smart card authentication and authorization framework using in multimedia cloud. Multimedia Tools and Applications:1–23

  31. Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267

    Article  Google Scholar 

  32. Zhang J, Deng B, Li X (2012) Learning with error based searchable encryption scheme. J Electron (China) 29(5):473–476

    Article  Google Scholar 

  33. Zheng XH, Chen N, Chen Z, et al (2014) Mobile cloud based framework for remote-resident multimedia discovery and access[J]. Journal of Internet Technology 15(6):1043–1050

    Google Scholar 

  34. Zhu W et al (2011) Multimedia cloud computing. IEEE Signal Processing Magazine 28.3:59–69

    Article  Google Scholar 

Download references

Acknowledgments

The authors are grateful to the anonymous editor and reviewers. This work is sponsored by National Natural Science Foundation of China (61402112, 61472307, 61472309, 61502106); Fujian Major Project of Regional Industry 2014H4015; Key Laboratory of Information Security, School Mathematics and Information Science, Guangzhou University (Grant No. GDXXAQ2016-09); Science and Technology Project of Fujian Education Department under Grant No. JA12028; Major Science and Technology Project of Fujian Province under Grant No. 2015H6013; Fundamental Research Funds for the Central Universities of China (ZYGX2014J061); Natural Science Basic Research Plan in Shaanxi Province of China (2014JQ1027); Basic Research Foundation of Xi’an University of Architecture and Technology (JC1416).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianghan Zheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Y., Zheng, X., Chang, V. et al. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimed Tools Appl 77, 9927–9941 (2018). https://doi.org/10.1007/s11042-017-4560-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4560-x

Keywords