Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method

被引:10
作者
Miao, Yinbin [1 ,2 ]
Zheng, Wei [1 ,2 ]
Jia, Xiaohua [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] City Univ Hong Kong, Hong Kong 999077, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Indexes; Keyword search; Cryptography; Security; Binary trees; Complexity theory; Servers; Ranked keyword search; k-means clustering algorithm; balanced binary tree; permutation matrix; forward security; ENABLING EFFICIENT; SECURE;
D O I
10.1109/TSC.2021.3140098
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ranked keyword search over encrypted data has been extensively studied in cloud computing as it enables data users to find the most relevant results quickly. However, existing ranked multi-keyword search solutions cannot achieve efficient ciphertext search and dynamic updates with forward security simultaneously. To solve the above problems, we first present a basic Machine Lear ning-based Ranked Keyword Search (ML-RKS) scheme in the static setting by using the k-means clustering algorithm and a balanced binary tree. ML-RKS reduces the search complexity without sacrificing the search accuracy, but is still vulnerable to forward security threats when applied in the dynamic setting. Then, we propose an Enhanced ML-RKS (called ML-RKS+) scheme by introducing a permutation matrix. ML-RKS+ prevents cloud servers from making search queries over newly added files via previous tokens, thereby achieving forward security. The security analysis proves that our schemes protect the privacy of indexes, query tokens and keywords. Empirical experiments using the real-world dataset demonstrate that our schemes are efficient and feasible in practical applications.
引用
收藏
页码:525 / 536
页数:12
相关论文
共 45 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [3] Σοφοζ - Forward Secure Searchable Encryption
    Bost, Raphael
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
  • [4] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [5] An Efficient Privacy-Preserving Ranked Keyword Search Method
    Chen, Chi
    Zhu, Xiaojie
    Shen, Peisong
    Hu, Jiankun
    Guo, Song
    Tari, Zahir
    Zomaya, Albert Y.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) : 951 - 963
  • [6] DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
    Chen, Lanxiang
    Qiu, Linbing
    Li, Kuan-Ching
    Shi, Wenbo
    Zhang, Nan
    [J]. SOFT COMPUTING, 2017, 21 (16) : 4829 - 4841
  • [7] DAI X, IN PRESS, DOI DOI 10.1109/TCC.2020.3047921
  • [8] Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data
    Ding, Xiaofeng
    Liu, Peng
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) : 344 - 357
  • [9] Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
    Fu, Zhangjie
    Wu, Xinle
    Wang, Qian
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) : 2986 - 2997
  • [10] Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Sun, Xingming
    Vasilakos, Athanasios V.
    Yang, Ching-Nung
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 813 - 823