loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Abir Awad 1 and Brian Lee 2

Affiliations: 1 Athlone Institut of Technology and University of South Wales, Ireland ; 2 Athlone Institut of Technology, Ireland

ISBN: 978-989-758-196-0

Keyword(s): Privacy, Personal Data, Searchable Encryption, Fuzzy Search, Chaotic Locality Sensitive Hashing, Metaphone.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Database Security and Privacy ; Information and Systems Security ; Information Assurance ; Information Hiding ; Personal Data Protection for Information Systems ; Privacy ; Privacy Enhancing Technologies ; Security and Privacy in the Cloud ; Security in Information Systems ; Security Protocols

Abstract: In this paper, we consider a use case for national border control and management involving the assurance of privacy and protection of personally identifiable information (PII) in a shared multi-tenant environment, i.e. the cloud. A fuzzy searchable encryption scheme is applied on a watch list of names which are used as indexes for the identification files that are in their turn encrypted and stored on the cloud. Two propositions are described and tested in this paper. The first entails the application of a chaotic fuzzy searchable encryption scheme directly on the use case and its subsequent verification on a number of phonetics synonyms for each name. In the second version, a metaphone based chaotic fuzzy transformation method is used to perform a secure search and query. In this latter case, the fuzzy transformation is performed in two stages: the first stage is the application of the metaphone algorithm which maps all the words pronounced in the same way to a single code and the se cond stage is the application of the chaotic Local Sensitive Hashing (LSH) to the code words. In both the first and second propositions, amplification of the LSH is also performed which permits controlled fuzziness and ranking of the results. Extensive tests are performed and experimental results show that the proposed scheme can be used for secure searchable identification files and a privacy preserving scheme on the cloud. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.236.216.93

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Awad, A. and Lee, B. (2016). A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management.In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 397-402. DOI: 10.5220/0005953503970402

@conference{secrypt16,
author={Abir Awad. and Brian Lee.},
title={A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={397-402},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005953503970402},
isbn={978-989-758-196-0},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management
SN - 978-989-758-196-0
AU - Awad, A.
AU - Lee, B.
PY - 2016
SP - 397
EP - 402
DO - 10.5220/0005953503970402

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.