Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update

被引:12
作者
Sun, Xingming [1 ]
Zhou, Lu [1 ]
Fu, Zhangjie [1 ]
Wang, Jin [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Coll Comp & Software, Nanjing 210044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 06期
关键词
Multi-keyword search; ranked search; dynamic update; encrypted cloud data;
D O I
10.14257/ijsia.2014.8.6.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data search service. Considering the huge number of outsourced data, there are three problems we are focused on to enable efficient search service: multi-keyword search, result relevance ranking and dynamic update. In this paper, we propose a practically efficient and flexible searchable encrypted scheme which supports both multi-keyword ranked search and dynamic update. To support multi-keyword search and result relevance ranking, we adopt Vector Space Model (VSM) to build the searchable index to achieve accurate search result. To improve search efficiency, we design a tree-based index structure which supports insertion and deletion update well without privacy leakage. We propose a secure search scheme to meet the privacy requirements in the threat model. Finally, experiments on real-world dataset are implemented to demonstrate the overall performance of the proposed scheme, which show our scheme is efficient.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 25 条
[1]  
Boneh D., 2004, P EUROCRYPT MAY 2 6
[2]  
Boneh D., 2007, P 4 THEOR CRYPT C FE
[3]  
Cao N., 2011, P IEEE INFOCOM
[4]  
Caytiles R. D., 2012, INT J MULTIMEDIA UBI, V7, P297
[5]  
Curtmola R., 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[6]  
Goh E. J., 2003, SECURE INDEXES
[7]  
Golle P., 2004, P ACNS JUN 8 11 YELL
[8]  
Grossman DA, 2004, INFORM RETRIEVAL ALG, V2nd
[9]  
Hwan J. S., 2012, INT J CONTROL AUTOM, V5, P63
[10]  
Kamara S., 2010, FINANCIAL CRYPTOGRAP