-
Survey on Secure Search Over Encrypted Data on the Cloud
Authors:
Hoang Pham,
Jason Woodworth,
Mohsen Amini Salehi
Abstract:
Cloud computing has become a potential resource for businesses and individuals to outsource their data to remote but highly accessible servers. However, potentials of the cloud services have not been fully unleashed due to users' concerns about security and privacy of their data in the cloud. User-side encryption techniques can be employed to mitigate the security concerns. Nonetheless, once the d…
▽ More
Cloud computing has become a potential resource for businesses and individuals to outsource their data to remote but highly accessible servers. However, potentials of the cloud services have not been fully unleashed due to users' concerns about security and privacy of their data in the cloud. User-side encryption techniques can be employed to mitigate the security concerns. Nonetheless, once the data in encrypted, no processing (e.g., searching) can be performed on the outsourced data. Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted. These techniques enable various types of search on the encrypted data and offer different levels of security. In addition, although these techniques enable different search types and vary in details, they share similarities in their components and architectures. In this paper, we provide a comprehensive survey on different secure search techniques; a high-level architecture for these systems, and an analysis of their performance and security level.
△ Less
Submitted 24 November, 2018;
originally announced November 2018.
-
S3BD: Secure Semantic Search over Encrypted Big Data in the Cloud
Authors:
Jason Woodworth,
Mohsen Amini Salehi
Abstract:
Cloud storage is a widely utilized service for both personal and enterprise demands. However, despite its advantages, many potential users with enormous amounts of sensitive data (big data) refrain from fully utilizing the cloud storage service due to valid concerns about data privacy. An established solution to the cloud data privacy problem is to perform encryption on the client-end. This approa…
▽ More
Cloud storage is a widely utilized service for both personal and enterprise demands. However, despite its advantages, many potential users with enormous amounts of sensitive data (big data) refrain from fully utilizing the cloud storage service due to valid concerns about data privacy. An established solution to the cloud data privacy problem is to perform encryption on the client-end. This approach, however, restricts data processing capabilities (eg, searching over the data). Accordingly, the research problem we investigate is how to enable real-time searching over the encrypted big data in the cloud. In particular, semantic search is of interest to clients dealing with big data. To address this problem, in this research, we develop a system (termed S3BD) for searching big data using cloud services without exposing any data to cloud providers. To keep real-time response on big data, S3BD proactively prunes the search space to a subset of the whole dataset. For that purpose, we propose a method to cluster the encrypted data. An abstract of each cluster is maintained on the client-end to navigate the search operation to appropriate clusters at the search time. Results of experiments, carried out on real-world big datasets, demonstrate that the search operation can be achieved in real-time and is significantly more efficient than other counterparts. In addition, a fully functional prototype of S3BD is made publicly available.
△ Less
Submitted 20 September, 2018;
originally announced September 2018.
-
Compressed Sensing Recovery via Nonconvex Shrinkage Penalties
Authors:
Joseph Woodworth,
Rick Chartrand
Abstract:
The $\ell^0$ minimization of compressed sensing is often relaxed to $\ell^1$, which yields easy computation using the shrinkage mapping known as soft thresholding, and can be shown to recover the original solution under certain hypotheses. Recent work has derived a general class of shrinkages and associated nonconvex penalties that better approximate the original $\ell^0$ penalty and empirically c…
▽ More
The $\ell^0$ minimization of compressed sensing is often relaxed to $\ell^1$, which yields easy computation using the shrinkage mapping known as soft thresholding, and can be shown to recover the original solution under certain hypotheses. Recent work has derived a general class of shrinkages and associated nonconvex penalties that better approximate the original $\ell^0$ penalty and empirically can recover the original solution from fewer measurements. We specifically examine p-shrinkage and firm thresholding. In this work, we prove that given data and a measurement matrix from a broad class of matrices, one can choose parameters for these classes of shrinkages to guarantee exact recovery of the sparsest solution. We further prove convergence of the algorithm iterative p-shrinkage (IPS) for solving one such relaxed problem.
△ Less
Submitted 11 April, 2015;
originally announced April 2015.
-
Point Localization and Density Estimation from Ordinal kNN graphs using Synchronization
Authors:
Mihai Cucuringu,
Joseph Woodworth
Abstract:
We consider the problem of embedding unweighted, directed k-nearest neighbor graphs in low-dimensional Euclidean space. The k-nearest neighbors of each vertex provides ordinal information on the distances between points, but not the distances themselves. We use this ordinal information along with the low-dimensionality to recover the coordinates of the points up to arbitrary similarity transformat…
▽ More
We consider the problem of embedding unweighted, directed k-nearest neighbor graphs in low-dimensional Euclidean space. The k-nearest neighbors of each vertex provides ordinal information on the distances between points, but not the distances themselves. We use this ordinal information along with the low-dimensionality to recover the coordinates of the points up to arbitrary similarity transformations (rigid transformations and scaling). Furthermore, we also illustrate the possibility of robustly recovering the underlying density via the Total Variation Maximum Penalized Likelihood Estimation (TV-MPLE) method. We make existing approaches scalable by using an instance of a local-to-global algorithm based on group synchronization, recently proposed in the literature in the context of sensor network localization and structural biology, which we augment with a scaling synchronization step. We demonstrate the scalability of our approach on large graphs, and show how it compares to the Local Ordinal Embedding (LOE) algorithm, which was recently proposed for recovering the configuration of a cloud of points from pairwise ordinal comparisons between a sparse set of distances.
△ Less
Submitted 5 November, 2015; v1 submitted 2 April, 2015;
originally announced April 2015.
-
Optimal ambiguity functions and Weil's exponential sum bound
Authors:
John J. Benedetto,
Robert L. Benedetto,
Joseph T. Woodworth
Abstract:
Complex-valued periodic sequences, u, constructed by Goran Bjorck, are analyzed with regard to the behavior of their discrete periodic narrow-band ambiguity functions A_p(u). The Bjorck sequences, which are defined on Z/pZ for p>2 prime, are unimodular and have zero autocorrelation on (Z/pZ)\{0}. These two properties give rise to the acronym, CAZAC, to refer to constant amplitude zero autocorrelat…
▽ More
Complex-valued periodic sequences, u, constructed by Goran Bjorck, are analyzed with regard to the behavior of their discrete periodic narrow-band ambiguity functions A_p(u). The Bjorck sequences, which are defined on Z/pZ for p>2 prime, are unimodular and have zero autocorrelation on (Z/pZ)\{0}. These two properties give rise to the acronym, CAZAC, to refer to constant amplitude zero autocorrelation sequences. The bound proven is |A_p(u)| \leq 2/\sqrt{p} + 4/p outside of (0,0), and this is of optimal magnitude given the constraint that u is a CAZAC sequence. The proof requires the full power of Weil's exponential sum bound, which, in turn, is a consequence of his proof of the Riemann hypothesis for finite fields. Such bounds are not only of mathematical interest, but they have direct applications as sequences in communications and radar, as well as when the sequences are used as coefficients of phase-coded waveforms.
△ Less
Submitted 10 July, 2011;
originally announced July 2011.