How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

被引:0
|
作者
Zhu, Yiming [1 ]
Zhou, Dehua [1 ]
Li, Yuan [1 ]
Song, Beibei [1 ]
Wang, Chuansheng [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Coll Cyber Secur, Guangzhou 510632, Peoples R China
来源
FUTURE INTERNET | 2023年 / 15卷 / 06期
基金
欧盟地平线“2020”; 中国国家自然科学基金;
关键词
searchable encryption; keyword frequency analysis; multi-keyword search; keyword guessing attacks; multi-user access; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; AUTHENTICATED ENCRYPTION; SEARCHABLE ENCRYPTION; SUPPORT; SCHEME;
D O I
10.3390/fi15060197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool for enhancing retrieval services in explicit databases. However, designing a PEKS scheme that integrates keyword frequency analysis while preserving privacy and security has remained challenging, as it may conflict with some of the security principles of PEKS. In this paper, we propose an innovative scheme that introduces a security deadline to query trapdoors through the use of timestamps. This means that the keywords in the query trapdoor can only be recovered after the security deadline has passed. This approach allows for keyword frequency analysis of query keywords without compromising data privacy and user privacy, while also providing protection against keyword-guessing attacks through the dual-server architecture of our scheme. Moreover, our scheme supports multi-keyword queries in multi-user scenarios and is highly scalable. Finally, we evaluate the computational and communication efficiency of our scheme, demonstrating its feasibility in practical applications.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query
    Wang, Jie
    Yu, Xiao
    Zhao, Ming
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (08) : 2375 - 2388
  • [32] Privacy-Preserving Reachability Query Services for Massive Networks
    Jiang, Jiaxin
    Yi, Peipei
    Choi, Byron
    Zhang, Zhiwei
    Yu, Xiaohui
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 145 - 154
  • [33] Privacy-preserving location-dependent query processing
    Atallah, MJ
    Frikken, KB
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 9 - 17
  • [34] Privacy-Preserving Reachability Query Services for Sparse Graphs
    Yi, Peipei
    Fan, Zhe
    Yin, Shuxiang
    2014 IEEE 30TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 2014, : 32 - 35
  • [35] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [36] Privacy-preserving spatial keyword location-to-trajectory matching
    Ning Wang
    Jianping Zeng
    Wenxing Hong
    Shunzhi Zhu
    Distributed and Parallel Databases, 2020, 38 : 667 - 686
  • [37] Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data
    Wodi, Bryan H.
    Leung, Carson K.
    Cuzzocrea, Alfredo
    Ourav, S.
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019,
  • [38] Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds
    Moataz, Tarik
    Justus, Benjamin
    Ray, Indrakshi
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 66 - 81
  • [39] Privacy-Preserving Multi-Keyword Search in Information Networks
    Tang, Yuzhe
    Liu, Ling
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (09) : 2424 - 2437
  • [40] Achieve Privacy-Preserving Truth Discovery in Crowdsensing Systems
    Tang, Jianchao
    Fu, ShaoJing
    Xu, Ming
    Luo, Yuchuan
    Huang, Kai
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 1301 - 1310