Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy-Preserving Multi-Keyword Top-$k$: Similarity Search Over Encrypted Data

Published: 01 March 2019 Publication History

Abstract

Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are involved to outsource their data on cloud servers for great convenience in data management and mining. However, data sets like health records in electronic documents usually contain sensitive information, which brings about privacy concerns if the documents are released or shared to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many traditional data analytic operators like keyword-based top- $k$ k document retrieval obsolete. In this paper, we investigate the multi-keyword top- $k$ k search problem for big data encryption against privacy breaches, and attempt to identify an efficient and secure solution to this problem. Specifically, for the privacy concern of query data, we construct a special tree-based index structure and design a random traversal algorithm, which makes even the same query to produce different visiting paths on the index, and can also maintain the accuracy of queries unchanged under stronger privacy. For improving the query efficiency, we propose a group multi-keyword top- $k$ k search scheme based on the idea of partition, where a group of tree-based indexes are constructed for all documents. Finally, we combine these methods together into an efficient and secure approach to address our proposed top- $k$ k similarity search. Extensive experimental results on real-life data sets demonstrate that our proposed approach can significantly improve the capability of defending the privacy breaches, the scalability and the time efficiency of query processing over the state-of-the-art methods.

Cited By

View all
  1. Privacy-Preserving Multi-Keyword Top-$k$: Similarity Search Over Encrypted Data

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Dependable and Secure Computing
    IEEE Transactions on Dependable and Secure Computing  Volume 16, Issue 2
    March 2019
    185 pages

    Publisher

    IEEE Computer Society Press

    Washington, DC, United States

    Publication History

    Published: 01 March 2019

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secure and Flexible Wildcard QueriesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343005619(7374-7388)Online publication date: 1-Jan-2024
    • (2024)Searching Untrusted Clouds Meets Multiple Keys: Privacy-Preserving Spatio-Textual Top-k QueryDatabase Systems for Advanced Applications10.1007/978-981-97-5562-2_12(190-209)Online publication date: 2-Jul-2024
    • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
    • (2023)Differentially private generative decomposed adversarial network for vertically partitioned data sharingInformation Sciences: an International Journal10.1016/j.ins.2022.11.006619:C(722-744)Online publication date: 8-Feb-2023
    • (2023)SEOT: Secure dynamic searchable encryption with outsourced ownership transferFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-022-2017-517:5Online publication date: 12-Jan-2023
    • (2023)A fog-assisted privacy preserving scheme for vehicular LBS queryTelecommunications Systems10.1007/s11235-023-01042-084:2(167-182)Online publication date: 27-Jul-2023
    • (2023)Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy GuaranteeDatabase Systems for Advanced Applications10.1007/978-3-031-30637-2_43(644-660)Online publication date: 17-Apr-2023
    • (2021)STQ-SCSSecurity and Communication Networks10.1155/2021/99397962021Online publication date: 1-Jan-2021
    • (2021)FMSM: A Fuzzy Multi-keyword Search Scheme for Encrypted Cloud Data based on Multi-chain Network50th International Conference on Parallel Processing Workshop10.1145/3458744.3474040(1-8)Online publication date: 9-Aug-2021
    • (2021)A Novel Privacy Preserving Framework for Large Scale Graph Data PublishingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.293190333:2(331-343)Online publication date: 11-Jan-2021
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media