Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Published: 01 January 2014 Publication History

Abstract

With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing (MRSE). We establish a set of strict privacy requirements for such a secure cloud data utilization system. Among various multi-keyword semantics, we choose the efficient similarity measure of "coordinate matching," i.e., as many matches as possible, to capture the relevance of data documents to the search query. We further use "inner product similarity" to quantitatively evaluate such similarity measure. We first propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. To improve search experience of the data search service, we further extend these two schemes to support more search semantics. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world data set further show proposed schemes indeed introduce low overhead on computation and communication.

Cited By

View all
  • (2024)Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud ComputingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341363019(6237-6251)Online publication date: 1-Jan-2024
  • (2024)Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior PredictionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339192819(4957-4969)Online publication date: 22-Apr-2024
  • (2024)Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337754919(4316-4330)Online publication date: 13-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems  Volume 25, Issue 1
January 2014
278 pages

Publisher

IEEE Press

Publication History

Published: 01 January 2014

Author Tags

  1. Cloud computing
  2. keyword search
  3. privacy-preserving
  4. ranked search
  5. searchable encryption

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud ComputingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341363019(6237-6251)Online publication date: 1-Jan-2024
  • (2024)Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior PredictionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339192819(4957-4969)Online publication date: 22-Apr-2024
  • (2024)Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337754919(4316-4330)Online publication date: 13-Mar-2024
  • (2024)Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic EncryptionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335090919(2454-2469)Online publication date: 1-Jan-2024
  • (2024)PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in CloudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.329171521:4(1831-1844)Online publication date: 1-Jul-2024
  • (2024)Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy PreservationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.326397421:2(860-875)Online publication date: 1-Mar-2024
  • (2024)Security analysis of a reversible data hiding scheme in encrypted images by redundant space transferJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10191436:1Online publication date: 17-Apr-2024
  • (2024)EPSMRFuture Generation Computer Systems10.1016/j.future.2024.04.058159:C(1-14)Online publication date: 1-Oct-2024
  • (2024)An effective keyword search co-occurrence multi-layer graph mining approachMachine Language10.1007/s10994-024-06528-9113:8(5773-5806)Online publication date: 1-Aug-2024
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media