A metaphone based chaotic searchable encryption algorithm for border management

Abir Awad, Brian Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    In this paper, we consider a use case for national border control and management involving the assurance of privacy and protection of personally identifiable information (PII) in a shared multi-tenant environment, i.e. the cloud. A fuzzy searchable encryption scheme is applied on a watch list of names which are used as indexes for the identification files that are in their turn encrypted and stored on the cloud. Two propositions are described and tested in this paper. The first entails the application of a chaotic fuzzy searchable encryption scheme directly on the use case and its subsequent verification on a number of phonetics synonyms for each name. In the second version, a metaphone based chaotic fuzzy transformation method is used to perform a secure search and query. In this latter case, the fuzzy transformation is performed in two stages: the first stage is the application of the metaphone algorithm which maps all the words pronounced in the same way to a single code and the second stage is the application of the chaotic Local Sensitive Hashing (LSH) to the code words. In both the first and second propositions, amplification of the LSH is also performed which permits controlled fuzziness and ranking of the results. Extensive tests are performed and experimental results show that the proposed scheme can be used for secure searchable identification files and a privacy preserving scheme on the cloud.

    Original languageEnglish
    Title of host publicationICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
    EditorsChristian Callegari, Marten van Sinderen, Enrique Cabello, Pierangela Samarati, Pascal Lorenz, Mohammad S. Obaidat, Panagiotis Sarigiannidis
    PublisherSciTePress Digital Library
    Pages397-402
    Number of pages6
    ISBN (Electronic)9789897581960
    DOIs
    Publication statusPublished - 2016
    Event13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016 - Lisbon, Portugal
    Duration: 26 Jul 201628 Jul 2016

    Publication series

    NameICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
    Volume4

    Conference

    Conference13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016
    Country/TerritoryPortugal
    CityLisbon
    Period26/07/1628/07/16

    Keywords

    • Chaotic locality sensitive hashing
    • Fuzzy search
    • Metaphone
    • Personal data
    • Privacy
    • Searchable encryption

    Fingerprint

    Dive into the research topics of 'A metaphone based chaotic searchable encryption algorithm for border management'. Together they form a unique fingerprint.

    Cite this