Advanced Search
    Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao. Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374. DOI: 10.7544/issn1000-1239.2019.20190365
    Citation: Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao. Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374. DOI: 10.7544/issn1000-1239.2019.20190365

    Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment

    • The intelligent environment built by machine learning, artificial intelligence, Internet of things is changing the way people live, work and think. The way of data storage and processing in intelligent environment is changing constantly, where security and efficiency are two important factors. In terms of security, privacy must be guaranteed during the sharing and analysis of data. In addition, many devices with limited resources exist in the intelligent environment, whose feasibility is directly influenced by how to design suitable algorithms or protocols. Based on the above two requirements, this paper studies the problem of secure pattern matching for intelligent environment. In the traditional secure pattern matching protocol, the pattern holder needs to compute lots of public-key operations,which is unsuitable for a resource-limited device such as a mobile phone. In this paper, we formalize the functionality of the secure pattern matching protocol under the two-cloud-assisted secure two-party computation model for the first time, and construct an efficient protocol via oblivious transfer (OT). The protocol is secure in semi-honest adversary model, assuming that no collusion exists between the cloud servers and the participants. The protocol requires 4 rounds, and the pattern holder performs only a small number of XOR operations, and the complex OT protocols are mainly executed between the database and the cloud servers. Furthermore, the OT extension technology can reduce the number of all OT protocols from O(nm) to O(k), where n and m are the input lengths of the two participants, and k is the number of base OT in OT extension protocol, which is much smaller than nm.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return