Peng ZHANG, Yan LI, Hai-lun LIN, et al. Approach to keyword search over encrypted data in cloud[J]. Journal on Communications, 2014, 35(Z2): 147-153.
DOI:
Peng ZHANG, Yan LI, Hai-lun LIN, et al. Approach to keyword search over encrypted data in cloud[J]. Journal on Communications, 2014, 35(Z2): 147-153. DOI: 10.3969/j.issn.1000-436x.2014.z2.020.
Approach to keyword search over encrypted data in cloud
large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy
sensitive data has to be encrypted before outsourcing
which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords
they don’t capture any relevance of data files
so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover
retrieving all files containing the queried keyword further incurs unnecessary network traffic
which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order
and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.
关键词
Keywords
references
VAQUERO L M , RODERO-MERINO L , CACERES J , et al . A break in the clouds:towards a cloud definition [J ] . ACM SIGCOMM Computer Communication Review , 2009 , 39 ( 1 ): 50 - 55 .
MENG X F , CI X . Big data management:concepts,techniques and challenges [J ] . Journal of Computer Research and Development , 2013 , 50 ( 1 ): 146 - 169 .
KAMARA S , LAUTER K . Cryptographic Cloud Storage [M ] . Financial Cryptography and Date Security Berlin,Heidelberg , 2010 . 136 - 149 .
CURTMOLA R , GARAY J A , KAMARA S , et al . Searchable symmetric encryption:improved definitions and efficient constructions [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . 2006 . 79 - 88 .
HWANG Y H , LEE P J . Public key encryption with conjunctive keyword search and its extension to a multi-user system [A ] . Pairing-Based Cryptography–Pairing 2007 [C ] . Springer Berlin Heidelberg , 2007 . 2 - 22 .
BOLDYREVA A , CHENETTE N , LEE Y , et al . Order-preserving symmetric encryption [A ] . Cryptology-EUROCRYPT 2009 [C ] . Springer Berlin Heidelberg , 2009 . 224 - 241 .
BOŽOVIĆ V , SOCEK D , STEINWANDT R , et al . Multi-authority attribute-based encryption with honest-but-curious central authority [J ] . International Journal of Computer Mathematics , 2012 , 89 ( 3 ): 268 - 283 .
SINGHAL A . Modern information retrieval:a brief overview [J ] . IEEE Data Engineering Bulletin , 2001 , 24 ( 4 ): 35 - 43 .
WITTEN I H , MOFFAT A , BELL T C . Managing Gigabytes:Compressing and Indexing Documents and Images [M ] . Morgan Kaufmann , 1999 .
PINKAS B , REINMAN T . Oblivious RAM revisited [A ] . Cryptology—CRYPTO 2010 [C ] . Springer Berlin Heidelberg , 2010 . 502 - 519 .
SWAMINATHAN A , MAO Y , SU G M , et al . Confidentiality-preserving rank-ordered search [A ] . Proceedings of the 2007 ACM Workshop on Storage Security and Survivability [C ] . 2007 . 7 - 12 .
ZERR S , OLMEDILLA D , NEJDL W , et al . Zerber+r:top-k retrieval from a confidential index [A ] . Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology [C ] . 2009 . 439 - 449 .