An Efficient Multi-keyword Ranked Retrieval Scheme with Johnson-Lindenstrauss Transform Over Encrypted Cloud Data

被引:3
|
作者
Li, Ke
Zhang, Weiming
Tian, Ke
Liu, Rundong
Yu, Nenghai
机构
来源
2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA) | 2013年
关键词
multi-keyword ranked search; privacy preserving; cloud computing;
D O I
10.1109/CLOUDCOM-ASIA.2013.37
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming more and more popular recently, and this trend encourages large corporations and companies to outsource their data to a remote cloud server. However, the concern of data privacy and security is a huge problem which impedes the development of cloud computing. It is essential and necessary to propose a scheme to realize the information retrieval and protect the data privacy at the same time. Since ranked multi-keyword search is a pretty practical question in this area and it has a significant influence on the user experience, we would mainly focus on the scheme to achieve high performance and low cost multi-keyword ranked search. In this paper, we proposed a novel search scheme with Johnson-Lindenstrauss transform (J-L scheme for short) and a technique called "optimised maximum query" to live up to our efficiency demand. Furthermore, we established a complete system to guarantee a set of strict privacy requirements. Extensive experiments on real-world database are presented to show our proposed scheme's efficiency and accuracy.
引用
收藏
页码:320 / 327
页数:8
相关论文
共 50 条
  • [41] Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data
    Sun, Xingming
    Wang, Xinhui
    Xia, Zhihua
    Fu, Zhangjie
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 319 - 332
  • [42] Efficient dynamic multi-keyword fuzzy search over encrypted cloud data
    Zhong, Hong
    Li, Zhanfei
    Cui, Jie
    Sun, Yue
    Liu, Lu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 149
  • [43] COMPARATIVE STUDY ON RSA ALGORITHM OF MULTI-KEYWORD SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
    Harshitha, Y.
    Seema, S.
    Apoorva, P.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [44] Multi-keyword Similarity Search over Encrypted Cloud Data
    Strizhov, Mikhail
    Ray, Indrajit
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 52 - 65
  • [45] Multi-User Multi-Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data
    Rane, Deepali D.
    Ghorpade, V. R.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [46] A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
    Li, Yuancheng
    Hou, Haiyan
    Chen, Wenping
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 284 - 296
  • [47] Privacy-Preserving and Ranked Search Using Advanced Multi-Keyword Scheme Over the Encrypted Cloud Environment
    Joshi, Narendra Shyam
    Sambrekar, Kuldeep P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 353 - 365
  • [48] Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing
    Sun, Jianfei
    Hu, Shengnan
    Nie, Xuyun
    Walker, Joojo
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1728 - 1739
  • [49] VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data
    Li, Xinghua
    Tong, Qiuyun
    Zhao, Jinwei
    Miao, Yinbin
    Ma, Siqi
    Weng, Jian
    Ma, Jianfeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 698 - 710
  • [50] A Novel Fuzzy Keyword Retrieval Scheme over Encrypted Cloud Data
    TIAN Ke
    ZHANG Weiming
    LI Ke
    WU Junming
    YU Nenghai
    WuhanUniversityJournalofNaturalSciences, 2013, 18 (05) : 393 - 401