An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability

被引:0
作者
Fu, Zhangjie [1 ]
Shu, Jiangang [1 ]
Sun, Xingming [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I | 2015年 / 152卷
关键词
Cloud computing; Semantic search; Verifiable search; CONJUNCTIVE KEYWORD SEARCH; PUBLIC-KEY ENCRYPTION; RANKED SEARCH; SEGMENTATION;
D O I
10.1007/978-3-319-23829-6_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing popularity of cloud computing, more and more sensitive or private information is being outsourced to cloud server. For protecting data privacy, sensitive data are always encrypted before being outsourced. Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability. Moreover, these schemes do not support verifiability of search result. To tackle the challenge, a smart semantic search scheme is proposed in this paper, which returns not only the result of keyword-based exact match, but also the result of keyword-based semantic match. At the same time, the proposed scheme supports the verifiability of search result.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 16 条
[1]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[4]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[5]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[6]  
Curtmola Reza, 2006, 13 ACM C COMP COMM S, P79, DOI DOI 10.1145/1180405.1180417
[7]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[8]   Secure conjunctive keyword search over encrypted data [J].
Golle, P ;
Staddon, J ;
Waters, B .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 :31-45
[9]  
Hwang YH, 2007, LECT NOTES COMPUT SC, V4575, P2
[10]   Segmentation-Based Image Copy-Move Forgery Detection Scheme [J].
Li, Jian ;
Li, Xiaolong ;
Yang, Bin ;
Sun, Xingming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :507-518