Skip navigation

Machine Learning meets Encrypted Search: the impact and efficiency of OMKSA in data security

Machine Learning meets Encrypted Search: the impact and efficiency of OMKSA in data security

Wei, Zhongkai ORCID logoORCID: https://orcid.org/0009-0001-1701-1043, Su, Ye ORCID logoORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi ORCID logoORCID: https://orcid.org/0000-0001-7237-3656, Yang, Haining ORCID logoORCID: https://orcid.org/0000-0002-1958-3117, Qin, Jing ORCID logoORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID logoORCID: https://orcid.org/0000-0001-7458-7412 (2025) Machine Learning meets Encrypted Search: the impact and efficiency of OMKSA in data security. International Journal of Intelligent Systems, 2025:2429577. ISSN 0884-8173 (Print), 1098-111X (Online) (doi:10.1155/int/2429577)

[thumbnail of Open Access Article]
Preview
PDF (Open Access Article)
49476 MA_Machine_Learning_Meets_Encrypted_Search_The_Impact_And_Efficiency_Of_OMKSA_(OA)_2025.pdf - Published Version
Available under License Creative Commons Attribution.

Download (720kB) | Preview

Abstract

The convergence of machine learning and searchable encryption enhances the ability to protect the privacy and security of data and enhances the processing power of confidential data. To enable users to efficiently perform machine learning tasks on encrypted data domains, we delve into oblivious keyword search with authorization (OKSA). The OKSA scheme effectively maintains the privacy of the user’s query keywords and prevents the cloud server from inferring ciphertext information through the searching process. However, limitations arise because the traditional OKSA approach does not support multi-keyword searches. If a data file is associated with multiple keywords, each keyword and corresponding data must be encrypted one by one, resulting in inefficiency. We introduce an innovative approach aimed at enhancing the efficiency of search processes while addressing the limitation of current encryption and search systems that handle only a single keyword. This method, known as the oblivious multiple keyword search with authorization (OMKSA), is designed for more effective keyword retrieval. One of our important innovations is that it uses the arithmetic techniques of bilinear pairs to generate new tokens and new search methods to optimize communication efficiency. Moreover, we present a detailed and rigorous demonstration of the security for our proposed protocol, aligned with the predefined security model. We conducted a comparative experiment to determine which of the two schemes, OKSA and OMKSA, is more efficient when querying multiple keywords. Based on our experimental results, our OMKSA is very efficient for data searchers. As the number of query keywords increases, the computational overhead of connected keyword searches remains stable. Finally, as we move into the 5G era, the potential applications of OMKSA are huge, with clear implications for areas such as machine learning and artificial intelligence. Our findings pave the way for further exploration and deployment of these frontier areas.

Item Type: Article
Uncontrolled Keywords: authorization, machine learning, oblivious transfer, searchable encryption
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Last Modified: 20 Jan 2025 17:12
URI: http://gala.gre.ac.uk/id/eprint/49476

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics