A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment

被引:9
作者
Wang, Haoyang [1 ]
Fan, Kai [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[2] Xidian Univ, Minist Educ Wide Band Gap Semicon Mat & Devices, Key Lab, Xian, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
P2P network; Secure kNN algorithm; Tree-based index; Time-stamp chain; Merkle tree; Forward and backward security; ACCESS-CONTROL; ENCRYPTION; EFFICIENT;
D O I
10.1007/s12083-020-00912-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet, Peer to Peer(P2P) network has been applied in various fields. Users in P2P network also have a large amount of data, but users cannot provide enough storage space locally. More and more users choose to upload their own data to cloud server in order to save overhead and facilitate sharing their own data with other users. In order to ensure data security, researchers have proposed searchable encryption(SE) technology, and searchable encryption has been widely used. In this paper, a dynamic verifiable multi-keyword ranked search scheme is proposed under the background of P2P network and cloud storage service(CSS). On the basis of using secure kNN algorithm to encrypt index and traditional inner product algorithm to obtain ranked results, the scheme in this paper realizes forward and backward security by changing the structure of file vector and using modular residual computation. Meanwhile, the integrity and freshness of search results are verified by combining timestamp chain and Merkle tree. Finally, the security of this scheme under two threat models is analyzed, and the performance evaluation experiment is carried out on the document set.
引用
收藏
页码:2342 / 2355
页数:14
相关论文
共 33 条
[1]  
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[2]  
Bing W, 2015, COMPUTER COMMUNICATI
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[5]  
CAO J, 2017, IEEE ICC, DOI DOI 10.1109/TCC.2017.2769645
[6]  
Dai H, 2019, IEEE ACCESS
[7]   Dynamic multi-client searchable symmetric encryption with support for boolean queries [J].
Du, Leilei ;
Li, Kenli ;
Liu, Qin ;
Wu, Zhiqiang ;
Zhang, Shaobo .
INFORMATION SCIENCES, 2020, 506 :234-257
[8]   Efficient and privacy preserving access control scheme for fog-enabled IoT [J].
Fan, Kai ;
Xu, Huiyue ;
Gao, Longxiang ;
Li, Hui ;
Yang, Yintang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 :134-142
[9]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[10]  
Goh E.-J., 2003, IACR Cryptol. ePrint Arch., V2003, P216