Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

被引:133
作者
Fu, Zhangjie [1 ]
Huang, Fengxiao [1 ]
Ren, Kui [2 ]
Weng, Jian [3 ]
Wang, Cong [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] Jinan Univ, Sch Informat Technol, Guangzhou 510632, Guangdong, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
Searchable encryption; cloud computing; smart semantic search; conceptual graphs; KEYWORD RANKED SEARCH; CLOUD; SECURE;
D O I
10.1109/TIFS.2017.2692728
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Searchable encryption is an important research area in cloud computing. However, most existing efficient and reliable ciphertext search schemes are based on keywords or shallow semantic parsing, which are not smart enough to meet with users' search intention. Therefore, in this paper, we propose a content-aware search scheme, which can make semantic search more smart. First, we introduce conceptual graphs (CGs) as a knowledge representation tool. Then, we present our two schemes (PRSCG and PRSCG-TF) based on CGs according to different scenarios. In order to conduct numerical calculation, we transfer original CGs into their linear form with some modification and map them to numerical vectors. Second, we employ the technology of multi-keyword ranked search over encrypted cloud data as the basis against two threat models and raise PRSCG and PRSCG-TF to resolve the problem of privacy-preserving smart semantic search based on CGs. Finally, we choose a real-world data set: CNN data set to test our scheme. We also analyze the privacy and efficiency of proposed schemes in detail. The experiment results show that our proposed schemes are efficient.
引用
收藏
页码:1874 / 1884
页数:11
相关论文
共 50 条
[1]  
[Anonymous], IEEE T NEURAL NETW L
[2]  
[Anonymous], 2005, APPL CRYPTOGRAPHY NE
[3]  
[Anonymous], 1983, Conceptual structures: information processing in mind and machine
[4]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[5]  
Chase M., 2010, STRUCTURED ENCRYPTIO, P577
[6]   An Efficient Privacy-Preserving Ranked Keyword Search Method [J].
Chen, Chi ;
Zhu, Xiaojie ;
Shen, Peisong ;
Hu, Jiankun ;
Guo, Song ;
Tari, Zahir ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) :951-963
[7]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[8]  
Cheng FQ, 2014, LECT NOTES COMPUT SC, V8485, P348, DOI 10.1007/978-3-319-08010-9_37
[9]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[10]   Assessing sentence scoring techniques for extractive text summarization [J].
Ferreira, Rafael ;
Cabral, Luciano de Souza ;
Lins, Rafael Dueire ;
Pereira e Silva, Gabriel ;
Freitas, Fred ;
Cavalcanti, George D. C. ;
Lima, Rinaldo ;
Simske, Steven J. ;
Favaro, Luciano .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (14) :5755-5764