Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management

被引:12
作者
Boucenna, Fateh [1 ,2 ]
Nouali, Omar [1 ]
Kechid, Samir [2 ]
Kechadi, M. Tahar [3 ]
机构
[1] Res Ctr Sci & Tech Informat, Secur Div, Algiers 16028, Algeria
[2] Univ Sci & Technol Houari Boumediene, Dept Comp Sci, Lab Res Artificial Intelligence, Algiers 16111, Algeria
[3] Univ Coll Dublin, Insight Ctr, Dublin D04 V1W8, Ireland
关键词
searchable encryption; cloud computing; homomorphic encryption; attribute-based encryption; inverted index; FULLY HOMOMORPHIC ENCRYPTION; ATTRIBUTE-BASED ENCRYPTION; KEYWORD RANKED SEARCH; EFFICIENT; SCHEME; RETRIEVAL;
D O I
10.1007/s11390-019-1903-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a technology that provides users with a large storage space and an enormous computing power. However, the outsourced data are often sensitive and confidential, and hence must be encrypted before being outsourced. Consequently, classical search approaches have become obsolete and new approaches that are compatible with encrypted data have become a necessity. For privacy reasons, most of these approaches are based on the vector model which is a time consuming process since the entire index must be loaded and exploited during the search process given that the query vector must be compared with each document vector. To solve this problem, we propose a new method for constructing a secure inverted index using two key techniques, homomorphic encryption and the dummy documents technique. However, 1) homomorphic encryption generates very large ciphertexts which are thousands of times larger than their corresponding plaintexts, and 2) the dummy documents technique that enhances the index security produces lots of false positives in the search results. The proposed approach exploits the advantages of these two techniques by proposing two methods called the compressed table of encrypted scores and the double score formula. Moreover, we exploit a second secure inverted index in order to manage the users' access rights to the data. Finally, in order to validate our approach, we performed an experimental study using a data collection of one million documents. The experiments show that our approach is many times faster than any other approach based on the vector model.
引用
收藏
页码:133 / 154
页数:22
相关论文
共 45 条
[1]  
[Anonymous], 2013, PROC ADV SCI TECHNOL
[2]  
[Anonymous], P 11 INT C BROADB WI
[3]  
[Anonymous], P 20 INT JOINT C ART
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Parallel search over encrypted data under attribute based encryption on the Cloud Computing [J].
Bouabana-Tebibel, Thouraya ;
Kaci, Abdellah .
COMPUTERS & SECURITY, 2015, 54 :77-91
[6]  
Boucenna F, 2017, INT CONF BIG DATA, P170, DOI 10.1109/BIGCOMP.2017.7881734
[7]   Concept-based Semantic Search over Encrypted Cloud Data [J].
Boucenna, Fateh ;
Nouali, Omar ;
Kechid, Samir .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2 (WEBIST), 2016, :235-242
[8]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]   EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
SIAM JOURNAL ON COMPUTING, 2014, 43 (02) :831-871
[10]   Efficient Fully Homomorphic Encryption from (Standard) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :97-106