MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data

被引:16
作者
Zhu Xiangyang [1 ]
Dai Hua [1 ,2 ]
Yi Xun [3 ]
Yang Geng [1 ,2 ]
Li Xiao [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp Sci & Technol, Nanjing 200013, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210013, Jiangsu, Peoples R China
[3] RMIT Univ, Sch Comp Sci & IT, Melbourne, Vic 3001, Australia
基金
中国国家自然科学基金;
关键词
KEYWORD RANKED SEARCH; PUBLIC-KEY ENCRYPTION; SIMILARITY; SECURE;
D O I
10.1155/2017/1923476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, services outsourcing in clouds has become a popular business model. However, due to the fact that data storage and computing are completely outsourced to the cloud service provider, sensitive data of data owners is exposed, which could bring serious privacy disclosure. In addition, some unexpected events, such as software bugs and hardware failure, could cause incomplete or incorrect results returned from clouds. In this paper, we propose an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data based on hierarchical agglomerative clustering, which is named MUSE. In order to improve the efficiency of text searching, we proposed a novel index structure, HAC-tree, which is based on a hierarchical agglomerative clustering method and tends to gather the high-relevance documents in clusters. Based on the HAC-tree, a noncandidate pruning depth-first search algorithm is proposed, which can filter the unqualified subtrees and thus accelerate the search process. The secure inner product algorithm is used to encrypted the HAC-tree index and the query vector. Meanwhile, a completeness verification algorithm is given to verify search results. Experiment results demonstrate that the proposed method outperforms the existing works, DMRS and MRSE-HCI, in efficiency and accuracy, respectively.
引用
收藏
页数:17
相关论文
共 37 条
[1]   Efficient top-k similarity document search utilizing distributed file systems and cosine similarity [J].
Alewiwi, Mahmoud ;
Orencik, Cengiz ;
Savas, Erkay .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01) :109-126
[2]  
[Anonymous], 2015, IEEE T PARALLEL DIST
[3]  
[Anonymous], IEEE T DEPENDABLE SE
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boneh D., 2004, P ANN INT C THEOR AP
[6]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[7]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[8]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[9]   An Efficient Privacy-Preserving Ranked Keyword Search Method [J].
Chen, Chi ;
Zhu, Xiaojie ;
Shen, Peisong ;
Hu, Jiankun ;
Guo, Song ;
Tari, Zahir ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) :951-963
[10]  
Fu Z., 2013, P 2013 IEEE 32 INT P