Confusing-Keyword Based Secure Search over Encrypted Cloud Data

被引:0
作者
Zhangjie Fu
Yangen Liu
Xingming Sun
Yuling Liu
Zuwei Tian
机构
[1] Nanjing University of Information Science and Technology,School of Computer and Software
[2] Jinan University,College of information science and technology
[3] Hunan University,College of Computer Science and Electronic Engineering
[4] Hunan First Normal University,School of Information Science and Engineering
来源
Mobile Networks and Applications | 2020年 / 25卷
关键词
Confusing keyword; Searchable encryption; Privacy protection; Wireless network;
D O I
暂无
中图分类号
学科分类号
摘要
As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored in the cloud. In order to solve the problem, this paper presents a privacy protection scheme based on confusing keyword. Based on user history retrieval data, the choosing and embedding of confusing keyword can be selectively implemented. Different from adding random values at the end of the vectors which was generated in other schemes, the embedding time of confusing keyword is selected before the generation of vectors in this paper, so as to truly achieve “random” effect and protect user privacy. In order to eliminate the unrelated documents caused by the matching of confusing keyword, this paper proposes a secondary search scheme based on confusing keyword in scheme 2. Through the construction of two trapdoors, two screenings are performed to ensure the accuracy of the data. Experiments based on real data demonstrate the effectiveness of the two schemes in this paper.
引用
收藏
页码:125 / 132
页数:7
相关论文
共 92 条
  • [1] Fu Zhangjie(2019)Writing in the Air with WiFi Signals for Virtual Reality Devices IEEE Transactions on Mobile Computing 18 473-484
  • [2] Xu Jiashuang(2017)ROSE: robustness strategy for scale-free wireless sensor networks IEEE/ACM Trans Networking 25 2944-2959
  • [3] Zhu Zhuangdi(2018)EABS: an event-aware backpressure scheduling scheme for emergency internet of things IEEE Trans Mob Comput 17 72-84
  • [4] Liu Alex X.(2018)How Can Heterogeneous Internet of Things Build Our Future: A Survey IEEE Communications Surveys & Tutorials 20 2011-2027
  • [5] Sun Xingming(2012)Enabling secure and efficient ranked keyword search over outsourced cloud data [J] Parallel and Distributed Systems, IEEE Transactions on 23 1467-1479
  • [6] Qiu T(2014)Privacy-preserving multi-keyword ranked search over encrypted cloud data [J] Parallel and Distributed Systems, IEEE Transactions on 25 222-233
  • [7] Zhao A(2016)A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data IEEE Transactions on Parallel and Distributed Systems 27 1-1
  • [8] Xia F(2017)Text-based searchable encryption in cloud: a survey Journal of Internet Technology 18 207-213
  • [9] Si W(2012)Embedding edit distance to enable private keyword search [J] Human-centric Computing and Information Sciences 2 1-12
  • [10] Wu DO(2017)Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data IEEE Transactions on Information Forensics and Security 12 2986-2997