Efficient Privacy Preserving of Multi-keyword Ranked Search Model over Encrypted Cloud Computing

被引:0
作者
Mlgheit, Jassim R. [1 ]
Houssein, Essam H. [2 ]
Zayed, Hala H. [1 ]
机构
[1] Benha Univ, Fac Comp & Informat, Banha, Egypt
[2] Minia Univ, Fac Comp & Informat, Al Minya, Egypt
来源
2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018) | 2018年
关键词
Cloud Computing; Multi-Keyword search; Coordinate Matching; Index Generation; Query privacy; Trapdoor; PUBLIC-KEY ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is store and retrieves data. Search over encrypted data is a technique of great interest in the cloud computing era because of the confidence that the sensitive data has to be encrypted before outsourcing to the cloud servers in order to guarantee user data privacy. Thus the need to develop an efficient and secure search scheme over encrypted data involves techniques from multiple domains, algorithms for search efficiency, and convenient design of cryptographic algorithms to ensure the security and privacy of the overall system have been considered as a paramount importance task in cloud computing. This paper reviews the state-of-the-art mechanisms for privacy preserving of multi-keyword search over encrypted data (MRSE) and summarizes a different kind of searching techniques for the encrypted data over the cloud, we achieve effective search technique using inner product similarity measure "coordinate matching". Furthermore, this paper establishes an integrated solution called privacy preserving of ranked search model to solve the challenging problem of MRSE and to investigate some further enhancements including supporting more search semantics. Accurate analysis investigating privacy and efficiency of the proposed model is provided, and experiments have demonstrated that the proposed model has achieved low overhead on both calculation and correspondence.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
[2]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[3]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[7]   A new privacy preserving technique for cloud service user endorsement using multi-agents [J].
Chandramohan, D. ;
Vengattaraman, T. ;
Rajaguru, D. ;
Dhavachelvan, P. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (01) :37-54
[8]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[9]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[10]  
Hall R, 2010, LECT NOTES COMPUT SC, V6344, P269, DOI 10.1007/978-3-642-15838-4_24