Ranked searchable encryption based on differential privacy and blockchain

被引:3
作者
Xu, Chungen [1 ]
Zhang, Pan [2 ]
Mei, Lin [1 ]
Zhao, Yu [1 ]
Xu, Lei [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; Ranked search; Laplace distribution; Order-preserving encryption; Blockchain; Smart contract; CLOUD; EFFICIENT;
D O I
10.1007/s11276-022-03109-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the area of information retrieval, in order to improve search accuracy and reduce communication overhead, there is an increasing tendency to adopt ranked search in engines. Ranked search allows cloud servers to search for the top k most relevant documents based on the relevance score between the query keywords and the documents. Recently, with the increasing popularity of encrypted search technologies, ranked searchable encryption is proposed accordingly which focuses on solving ranked search problem over encrypted databases. However, recent studies show that some privacy protection methods commonly used in ranked searchable encryption, like order-preserving encryption (OPE), have some security problems. These problems may lead to the leakage of the relevant ranking privacy information. Meanwhile, most of the existing ranked searchable encryption schemes do not consider the problem of payment for outsourced services. In this paper, we propose a scheme called ranked searchable encryption based on differential privacy and blockchain (DPB-RSE). Specifically, we first add noise drawn from a Laplace distribution into the relevance score to disturb its value. Then we design a smart contract to verify the correctness of the results returned by the cloud server and realize payment fairness. The experiment results demonstrate that the accuracy of search results in this scheme can reach 94% in a small privacy budge.
引用
收藏
页码:4735 / 4748
页数:14
相关论文
共 51 条
[1]  
Agrawal R., 2004, Proc. ACM SIGMOD International Conference on Management of Data, P563
[2]   Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption [J].
Alabdulatif, Abdulatif ;
Khalil, Ibrahim ;
Yi, Xun .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :192-204
[3]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[6]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[7]   Bestie: Very Practical Searchable Encryption with Forward and Backward Security [J].
Chen, Tianyang ;
Xu, Peng ;
Wang, Wei ;
Zheng, Yubo ;
Susilo, Willy ;
Jin, Hai .
COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 :3-23
[8]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[9]  
Dannen C., 2017, INTRO ETHEREUM SOLID
[10]   Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab [J].
Delmolino, Kevin ;
Arnett, Mitchell ;
Kosba, Ahmed ;
Miller, Andrew ;
Shi, Elaine .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :79-94