A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management

Abir Awad, Brian Lee

Abstract

In this paper, we consider a use case for national border control and management involving the assurance of privacy and protection of personally identifiable information (PII) in a shared multi-tenant environment, i.e. the cloud. A fuzzy searchable encryption scheme is applied on a watch list of names which are used as indexes for the identification files that are in their turn encrypted and stored on the cloud. Two propositions are described and tested in this paper. The first entails the application of a chaotic fuzzy searchable encryption scheme directly on the use case and its subsequent verification on a number of phonetics synonyms for each name. In the second version, a metaphone based chaotic fuzzy transformation method is used to perform a secure search and query. In this latter case, the fuzzy transformation is performed in two stages: the first stage is the application of the metaphone algorithm which maps all the words pronounced in the same way to a single code and the second stage is the application of the chaotic Local Sensitive Hashing (LSH) to the code words. In both the first and second propositions, amplification of the LSH is also performed which permits controlled fuzziness and ranking of the results. Extensive tests are performed and experimental results show that the proposed scheme can be used for secure searchable identification files and a privacy preserving scheme on the cloud.

References

  1. Awad, A., Matthews, A., Qiao, Y., Lee, B., 2015. "Chaotic Searchable Encryption for Mobile Cloud Storage." IEEE Transactions on Cloud Computing.
  2. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W., 2010. "Fuzzy keyword search over encrypted data in cloud computing," INFOCOM, 2010 Proceedings IEEE, Dept. of ECE, Illinois Inst. of Technol., Chicago, IL, USA.
  3. Yang, B., Pang, X., Du, Q., Xie, D., 2014. "Effective ErrorTolerant Keyword Search for Secure Cloud Computing," Journal of computer science and technology, vol. 29, no.1, pp. 81-89.
  4. Bringer, J., Chabanne, H., 2011. "Embedding edit distance to enable private keyword search," Secure and Trust Computing, Data Management and Applications, Communications in Computer and Information Science, vol. 186, no. 1, pp. 105-113.
  5. Kuzu, M., Islm, M. S., Kantarcioglu, M., 2012. "Efficient similarity search over encrypted data," ICDE's12 proceedings of the 2012 IEEE 28th International conference on data engineering, pp. 1156-1167, IEEE computer society Washington, DC, USA.
  6. Awad, A., Awad, D., 2010. "Efficient image chaotic encryption algorithm with no propagation error," ETRI journal, vol. 32, no. 5, pp. 774-783.
  7. Awad, A., Miri, A., 2012. "A new image encryption algorithm based on a chaotic DNA substitution method," in Communications (ICC), 2012 IEEE International Conference on, pp. 1011-1015.
  8. Ismail, M., Chalhoub, G., Bakhache, B., 2012. "Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 913-919.
  9. Rostom, R., Bakhache, B., Salami, H., Awad, A., 2014. "Quantum cryptography and chaos for the transmission of security keys in 802.11 networks," in the 17th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 350-356.
  10. Lawrence, Ph., 1990. “Hanging on the Metaphone,” Computer Language, Vol. 7, No. 12.
  11. Lawrence, Ph., 2000. "The double metaphone search algorithm." C/C++ users journal, pp. 38-43.
  12. Metaphone3. http://www.amorphics.com/ metaphone3.html.
  13. Parmar, V. P., Kumbharana, C. K., 2014. “Study Existing Various Phonetic Algorithms and Designing and Development of a working model for the New Developed Algorithm and Comparison by implementing it with Existing Algorithm”. International Journal of Computer Applications.
  14. Fakenamegenerator, 2013. http://www.fakenamegenerator. com/ order.php.
  15. Moby Words, 2016. "Moby Words" project. http://icon.shef.ac.uk/Moby/mwords.html.
  16. Awad, A., Matthews, A., Lee, B., 2014. "Secure cloud storage and search scheme for mobile devices," in the 17th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 144-150.
  17. Hoepman, J. H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R W., 2006. “Crossing borders: Security and privacy issues of the european e-passport,” In Advances in Information and Computer Security, Springer Berlin Heidelberg, pp. 152-167.
  18. Pang, C., Gu, L., Hansen, D., Maeder, A., 2009. “Privacypreserving fuzzy matching using a public reference table,” In Intelligent Patient Management, Springer Berlin Heidelberg, pp. 71-89.
  19. Bissessar, D., Adams, C., Stoianov, A., 2016. “Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents,” In Recent Advances in Computational Intelligence in Defense and Security 2016, Springer International Publishing, pp. 339-366.
Download


Paper Citation


in Harvard Style

Awad A. and Lee B. (2016). A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 397-402. DOI: 10.5220/0005953503970402


in Bibtex Style

@conference{secrypt16,
author={Abir Awad and Brian Lee},
title={A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={397-402},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005953503970402},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management
SN - 978-989-758-196-0
AU - Awad A.
AU - Lee B.
PY - 2016
SP - 397
EP - 402
DO - 10.5220/0005953503970402