Query-Biased Preview over Outsourced and Encrypted Data

被引:2
作者
Peng, Ningduo [1 ]
Luo, Guangchun [1 ]
Qin, Ke [1 ]
Chen, Aiguo [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
关键词
FULLY HOMOMORPHIC ENCRYPTION; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE;
D O I
10.1155/2013/860621
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and.. is the snippet length.
引用
收藏
页数:13
相关论文
共 42 条
[1]  
Abdalla M., 2006, P 25 ANN INT CRYPT C, P205
[2]  
[Anonymous], 2003, SECURE INDEXES
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4622, P50
[5]  
Bosch Christoph, 2011, Secure Data Management. Proceedings 8th VLDB Workshop (SDM2011), P114, DOI 10.1007/978-3-642-23556-6_8
[6]  
Bringer J, 2011, COMM COM INF SC, V186, P105
[7]  
Cachin C, 1999, LECT NOTES COMPUT SC, V1592, P402
[8]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[9]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[10]   Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594