RSAE: Ranked Keyword Search over Asymmetric Encrypted cloud data

被引:3
作者
Guo, Cheng [1 ]
Song, Qiongqiong [1 ]
Zhuang, Ruhan [1 ]
Feng, Bin [1 ]
机构
[1] Dalian Univ Technol, Software Sch, Dalian, Peoples R China
来源
PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015 | 2015年
关键词
asymmetric encryption; cloud data; identity based encryption; keyword search; searchable encryption; Top-N files retrieval;
D O I
10.1109/BDCloud.2015.11
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing becomes more and more popular and is applied into many practical applications because of much cheaper and more powerful features. In cloud system, users can outsource local data to the cloud servers to lighten their local storage and computing resource loads, which products a new industry method of use-on-demand, pay-on-use. However outsourcing data to cloud servers makes sensitive information centralized into the server, which brings great challenge to protecting sensitive information privacy. For privacy preserving, the user encrypts sensitive data before outsourcing. Traditional searchable encryption methods make it possible for users to securely conduct keyword search over encrypted data and finally retrieve the most relevant Top-N files among the whole data. In this paper, we systematically propose a scheme to solve the problem of how to securely and efficiently retrieve the Top-N files by keyword-based searching over encrypted data by asymmetric encrypted.
引用
收藏
页码:82 / 86
页数:5
相关论文
共 23 条
[1]  
[Anonymous], NDSS
[2]   Security and Privacy-Enhancing Multicloud Architectures [J].
Bohli, Jens-Matthias ;
Gruschka, Nils ;
Jensen, Meiko ;
Lo Iacono, Luigi ;
Marnau, Ninja .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :212-224
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
CREPEAU C, 1988, LECT NOTES COMPUT SC, V293, P350
[6]  
Duncan A. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P857, DOI 10.1109/TrustCom.2012.188
[7]  
Duncan Adrian, 2014, CONCURRENCY COMPUTAT
[8]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647
[9]   Software protection and simulation on oblivious RAMs [J].
Goldreich, O ;
Ostrovsky, R .
JOURNAL OF THE ACM, 1996, 43 (03) :431-473
[10]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13