Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management

被引:0
|
作者
Fateh Boucenna
Omar Nouali
Samir Kechid
M. Tahar Kechadi
机构
[1] Security Division,Laboratory of Research in Artificial Intelligence, Department of Computer Science
[2] Research Center for Scientific and Technical Information,The Insight Centre
[3] University of Sciences and Technology Houari Boumediene,undefined
[4] University College Dublin,undefined
来源
Journal of Computer Science and Technology | 2019年 / 34卷
关键词
searchable encryption; cloud computing; homomorphic encryption; attribute-based encryption; inverted index;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a technology that provides users with a large storage space and an enormous computing power. However, the outsourced data are often sensitive and confidential, and hence must be encrypted before being outsourced. Consequently, classical search approaches have become obsolete and new approaches that are compatible with encrypted data have become a necessity. For privacy reasons, most of these approaches are based on the vector model which is a time consuming process since the entire index must be loaded and exploited during the search process given that the query vector must be compared with each document vector. To solve this problem, we propose a new method for constructing a secure inverted index using two key techniques, homomorphic encryption and the dummy documents technique. However, 1) homomorphic encryption generates very large ciphertexts which are thousands of times larger than their corresponding plaintexts, and 2) the dummy documents technique that enhances the index security produces lots of false positives in the search results. The proposed approach exploits the advantages of these two techniques by proposing two methods called the compressed table of encrypted scores and the double score formula. Moreover, we exploit a second secure inverted index in order to manage the users’ access rights to the data. Finally, in order to validate our approach, we performed an experimental study using a data collection of one million documents. The experiments show that our approach is many times faster than any other approach based on the vector model.
引用
收藏
页码:133 / 154
页数:21
相关论文
共 50 条
  • [1] Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management
    Boucenna, Fateh
    Nouali, Omar
    Kechid, Samir
    Kechadi, M. Tahar
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (01) : 133 - 154
  • [2] Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data
    Raghavendra, S.
    Meghana, K.
    Doddabasappa, P. A.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 293 - 300
  • [3] Secure Search over Encrypted Enterprise Data in the Cloud
    Wang, Kaishi
    Guo, Jiaqi
    International Journal of Network Security, 2023, 25 (01) : 103 - 112
  • [4] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [5] Survey on secure search over encrypted data on the cloud
    Hoang Pham
    Woodworth, Jason
    Salehi, Mohsen Amini
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):
  • [6] Search Over Encrypted Cloud Data With Secure Updates
    Ocansey, Selasi Kwame
    Wang, Changda
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 380 - 386
  • [7] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Zhangjie Fu
    Yangen Liu
    Xingming Sun
    Yuling Liu
    Zuwei Tian
    Mobile Networks and Applications, 2020, 25 : 125 - 132
  • [8] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Fu, Zhangjie
    Liu, Yangen
    Sun, Xingming
    Liu, Yuling
    Tian, Zuwei
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 125 - 132
  • [9] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [10] Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud
    Xia, Lili
    Fu, Zhangjie
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 151 - 159