Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Smart Search over Encrypted Educational Resources in Cloud Storage

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1557))

Included in the following conference series:

  • 730 Accesses

Abstract

With the development of education, educational big data is taking shape, and the cloud has a natural advantage of storing big data. Data is usually stored in the cloud server in the form of ciphertext for the sake of privacy protection. However, this is against the use of data. Currently, although the search schemes under ciphertext are primarily based on keywords, these schemes fail to reflect the actual needs of users well. Moreover, the quality of educational resources varies. Therefore, ensuring users’ privacy protection while providing high-quality educational resources is challenging. In order to solve this problem, a Smart Search over Encrypted Educational Resources (SSEER) in cloud storage was proposed in this paper. The contribution of this paper is mainly reflected in two aspects: First, SSEER introduces a trusted third party (TTP) server to obtain a large number of educational resources through crowdsourcing. Second, the index is updated based on the user’s use of educational resources, through which high-quality educational resources can be identified, thus increasing the probability for users to access quality resources. As a result, the educational resource graph can screen out the educational resources related to the user search.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bouguessa, M., Romdhane, L.B.: Identifying authorities in online communities. ACM Trans. Intell. Syst. Technol. (TIST) 6(3), 30 (2015)

    Google Scholar 

  2. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2013)

    Article  Google Scholar 

  3. Chai, W., Xu, W., Zuo, M., Wen, X.: ACQR: a novel framework to identify and predict influential users in micro-blogging. In: PACIS, p. 20 (2013)

    Google Scholar 

  4. Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: International Conference on Applied Cryptography and Network Security, pp. 442–455 (2005)

    Google Scholar 

  5. Chittilappilly, A.I., Chen, L., Amer-Yahia, S.: A survey of general-purpose crowdsourcing techniques. IEEE Trans. Knowl. Data Eng. 28(9), 2246–2266 (2016)

    Article  Google Scholar 

  6. Cui, B., Liu, Z., Wang, L.: Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)

    Article  MathSciNet  Google Scholar 

  7. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)

    Article  Google Scholar 

  8. Dan, B., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522 (2004)

    Google Scholar 

  9. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  10. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3

    Chapter  Google Scholar 

  11. Howe, J.: Crowdsourcing: A definition (2006)

    Google Scholar 

  12. Howe, J.: The rise of crowdsourcing. Wired Mag. 14(6), 1–4 (2006)

    Google Scholar 

  13. Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017). 403C404

    Google Scholar 

  14. Li, H., Liu, D., Dai, Y., Luan, T.H., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2018)

    Article  Google Scholar 

  15. Li, J., Peng, W., Li, T., Sun, T., Li, Q., Xu, J.: Social network user influence sense-making and dynamics prediction. Expert Syst. Appl. 41(11), 5115–5124 (2014)

    Article  Google Scholar 

  16. Liu, Q., Tan, C.C., Wu, J., Wang, G.: Towards differential query services in cost-efficient clouds. IEEE Trans. Parallel Distrib. Syst. 25(6), 1648–1658 (2014)

    Article  Google Scholar 

  17. Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)

    Google Scholar 

  18. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000. Proceedings, p. 0044 (2002)

    Google Scholar 

  19. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262. IEEE (2010)

    Google Scholar 

  20. Wang, Q., He, M., Du, M., Chow, S.S., Lai, R.W., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. 15(3), 496–510 (2018)

    Article  Google Scholar 

  21. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data, pp. 139–152 (2009)

    Google Scholar 

  22. Xiao, F., Noro, T., Tokuda, T.: Finding news-topic oriented influential twitter users based on topic related hashtag community detection. J. Web Eng. 13(5&6), 405–429 (2014)

    Google Scholar 

  23. Yin, Z., Zhang, Y.: Measuring pair-wise social influence in microblog. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 502–507. IEEE (2012)

    Google Scholar 

  24. Zhang, Q., Liu, Q., Wang, G.: A privacy-preserving hybrid cooperative searching scheme over outsourced cloud data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 265–278 (2016)

    Google Scholar 

  25. Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)

    Article  Google Scholar 

  26. Zhang, Q., Wang, G., Tang, W., Alinani, K., Liu, Q., Li, X.: Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176, 81–90 (2021)

    Article  Google Scholar 

  27. Zhang, S., Choo, K.K.R., Liu, Q., Wang, G.: Enhancing privacy through uniform grid and caching in location-based services. Futur. Gener. Comput. Syst. 86, 881–892 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 & 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, in part by Scientific Research Fund of Hunan Provincial Education Department under Grants 19B208 & 20C0809 & 21A0599, in part by Project of Hunan Social Science Achievement Appraisal Committee in 2020 under Grant XSP20YBZ043, and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guihua Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Q., Duan, G., Liu, S. (2022). Smart Search over Encrypted Educational Resources in Cloud Storage. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0468-4_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0467-7

  • Online ISBN: 978-981-19-0468-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics