An efficient privacy-preserving rank query over encrypted data in cloud computing

被引:0
|
作者
Cheng, Fang-Quan [1 ,2 ]
Peng, Zhi-Yong [1 ,2 ]
Song, Wei [1 ,2 ]
Wang, Shu-Lin [1 ,2 ]
Cui, Yi-Hui [1 ,2 ]
机构
[1] State Key Laboratory of Software Engineering, Wuhan University
[2] Computer School, Wuhan University
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2012年 / 35卷 / 11期
关键词
Bloom filter; Certificateless authentication; Cloud computing; Hierarchical index; Rank query;
D O I
10.3724/SP.J.1016.2012.02215
中图分类号
学科分类号
摘要
In cloud computing, for protecting the privacy of the sensitive cloud data, an effective methodology is to encrypt the data before outsourcing. However, data encryption makes data utilization, e. g. querying, a very challenging task. Though many solutions have been proposed, they are insufficient or even ineffective to achieve efficient multi-keyword rank query and flexible selective query authorization with multiple data owners while keeping strong privacy preserving. In this paper, we propose an efficient privacy-preserving rank query over encrypted data (RQED). Through the improved searchable public key encryption (PKES) with certificateless authentication, we establish the RQED framework. Based on the RQED framework, we design a more sound and privacy-preserving RQED rank function, and propose a hierarchical index based on dynamic Bloom filters. The theoretical analysis and experimental evaluation show that the proposed solutions indeed achieve powerful privacy guarantee, efficient query performance, low communication overhead and effective query authorization control.
引用
收藏
页码:2215 / 2227
页数:12
相关论文
共 17 条
  • [1] Vaquero L.M., Rodero-Merino L., Caceres J., Lindner M.A., A break in the clouds: Towards a cloud definition, ACM SIGCOMM Computer Communication Review, 39, 1, pp. 50-55, (2009)
  • [2] Kamara S., Lauter K., Cryptographic cloud storage, Proceedings of the Financial Cryptography Workshops, pp. 136-149, (2010)
  • [3] Cao N., Wang C., Li M., Ren K., Lou W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2011), pp. 829-837, (2011)
  • [4] Hacigumus H., Iyer B., Mehrotra S., Providing database as a service, Proceedings of the 18th International Conference on Data Engineering (ICDE 2002), pp. 29-40, (2002)
  • [5] Song D., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proceedings of the IEEE Symposium on Security and Privacy (S&P 2000), pp. 44-55, (2000)
  • [6] Wong W.K., Cheung D.W., Kao B., Mamoulis N., Secure kNN computation on encrypted databases, Proceedings of the 35th International Conference on Management of Data (SIGMOD 2009), pp. 139-152, (2009)
  • [7] Goh E.-J., Secure indexes, (2003)
  • [8] Boneh D., Crescenzo G., Ostrovsky R., Persiano G., Public key encryption with keyword search, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004), pp. 506-522, (2004)
  • [9] Boneh D., Kushilevitz E., Ostrovsky R., Skeith III W.E., Public key encryption that allows PIR queries, Proceedings of the 27th Annual International Cryptology Conference (CRYPTO 2007), pp. 50-67, (2007)
  • [10] Curtmola R., Garay J.A., Kamara S., Ostrovsky R., Searchable symmetric encryption: Improved definitions and efficient constructions, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88, (2006)