Secure Cloud-Aided Approximate Nearest Neighbor Search on High-Dimensional Data

As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information retrieval, and recommendation system. LSH (Local sensitive hashing) is one of the most popular hash-based approaches to solve ANN problems. Howe...

全面介绍

Saved in:
书目详细资料
Main Authors: Jia, Liu, Wang, Yin Chai, Fengrui, Wei, QING, HAN, YUNTING, TAO, Liping, Zhao, Xinjin, Li, HONGBON, SUN
格式: Article
语言:English
出版: IEEE 2023
主题:
在线阅读:http://ir.unimas.my/id/eprint/44823/1/Secure%20Cloud-Aided.pdf
http://ir.unimas.my/id/eprint/44823/
https://ieeexplore.ieee.org/document/10268927
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information retrieval, and recommendation system. LSH (Local sensitive hashing) is one of the most popular hash-based approaches to solve ANN problems. However, the efficiency of operating LSH needs to be improved, as the operations of LSH often involve resource-consuming matrix operations and high-dimensional large-scale datasets. Meanwhile, for resource-constrained devices, this problem becomes more serious. One way to handle this problem is to outsource the heavy computing of high-dimensional large-scale data to cloud servers. However, when a cloud server responsible for computing tasks is untrustworthy, some security issues may arise. In this study, we proposed a cloud server-aided LSH scheme and the application model. This scheme can perform the LSH efficiently with the help of a cloud server and guarantee the privacy of the client’s information. And, in order to identify the improper behavior of the cloud server, we also provide a verification method to check the results returned from the cloud server. Meanwhile, for the implementation of this scheme on resourceconstrained devices, we proposed a model for the real application of this scheme. To verify the efficiency and correctness of the proposed scheme, theoretical analysis and experiments are conducted. The results of experiments and theoretical analysis indicate that the proposed scheme is correct, verifiable, secure and efficient.