A Privacy-Preserving Multi-keyword Ranked Search Scheme over Encrypted Cloud Data using MIR-tree

被引:0
作者
Gurjar, Sonu Pratap Singh [1 ]
Pasupuleti, Syam Kumar [2 ]
机构
[1] Indian Inst Technol BHU, Comp Sci & Engn, Varanasi, Uttar Pradesh, India
[2] IDRBT, Hyderabad, Telangana, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST) | 2016年
关键词
Cloud computing; MIR-tree; multi-keyword ranked search; data integrity; privacy-preserving; trapdoor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increasing popularity of cloud computing, the data owners are motivated to outsource their sensitive data to cloud servers for flexibility and reduced cost in data management. However, privacy is a big concern for outsourcing data to the cloud. The data owners typically encrypt documents before outsourcing for privacy-preserving. As the volume of data is increasing at a dramatic rate, it is essential to develop an efficient and reliable ciphertext search techniques, so that data owners can easily access and update cloud data. In this paper, we propose a privacy preserving multi-keyword ranked search scheme over encrypted data in cloud along with data integrity using a new authenticated data structure MIR-tree. The MIR-tree based index with including the combination of widely used vector space model and TFxIDF model in the index construction and query generation. We use inverted file index for storing word-digest, which provides efficient and fast relevance between the query and cloud data. Design an authentication set(AS) for authenticating the queries, for verifying top-k search results. Because of tree based index, our scheme achieves optimal search efficiency and reduces communication overhead for verifying the search results. The analysis shows security and efficiency of our scheme.
引用
收藏
页码:533 / 538
页数:6
相关论文
共 20 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Arrington M., 2006, Gmail Disaster: Reports Of Mass Email Deletions [Online]. Available
[3]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[4]   An Efficient Privacy-Preserving Ranked Keyword Search Method [J].
Chen, Chi ;
Zhu, Xiaojie ;
Shen, Peisong ;
Hu, Jiankun ;
Guo, Song ;
Tari, Zahir ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) :951-963
[5]  
Curtmola R., 2006, P ACM 13 C COMP COMM
[6]  
Grzonkowski S., 2011, P IEEE INT C CONS EL, P8387
[7]  
Kamara S., 2010, FINANCIAL CRYPTOGRAP
[8]   Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage [J].
Li, Hongwei ;
Liu, Dongxia ;
Dai, Yuanshun ;
Luan, Tom H. ;
Shen, Xuemin .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) :127-138
[9]   Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing [J].
Liu, Hong ;
Ning, Huansheng ;
Xiong, Qingxu ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (01) :241-251
[10]  
Merkle R. C., 1989, P ADV CRYPT, P218238