ICT Systems Security and Privacy Protection
Volume 428 of the series IFIP Advances in Information and Communication Technology pp 52-65
Multi-keyword Similarity Search over Encrypted Cloud Data
- Mikhail StrizhovAffiliated withColorado State University
- , Indrajit RayAffiliated withColorado State University
Abstract
Searchable encryption allows one to upload encrypted documents on a remote honest-but-curious server and query that data at the server itself without requiring the documents to be decrypted prior to searching. In this work, we propose a novel secure and efficient multi-keyword similarity searchable encryption (MKSim) that returns the matching data items in a ranked ordered manner. Unlike all previous schemes, our search complexity is sublinear to the total number of documents that contain the queried set of keywords. Our analysis demonstrates that proposed scheme is proved to be secure against adaptive chosen-keyword attacks. We show that our approach is highly efficient and ready to be deployed in the real-world cloud storage systems.
Keywords
searchable encryption secure cloud outsourcing multi-keyword ranked search homomorphic encryption- Title
- Multi-keyword Similarity Search over Encrypted Cloud Data
- Book Title
- ICT Systems Security and Privacy Protection
- Book Subtitle
- 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
- Pages
- pp 52-65
- Copyright
- 2014
- DOI
- 10.1007/978-3-642-55415-5_5
- Print ISBN
- 978-3-642-55414-8
- Online ISBN
- 978-3-642-55415-5
- Series Title
- IFIP Advances in Information and Communication Technology
- Series Volume
- 428
- Series ISSN
- 1868-4238
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- IFIP International Federation for Information Processing
- Additional Links
- Topics
- Keywords
-
- searchable encryption
- secure cloud outsourcing
- multi-keyword ranked search
- homomorphic encryption
- Industry Sectors
- eBook Packages
- Editors
-
-
Nora Cuppens-Boulahia
(1)
-
Frédéric Cuppens
(1)
-
Sushil Jajodia
(2)
-
Anas Abou El Kalam
(3)
-
Thierry Sans
(4)
-
Nora Cuppens-Boulahia
- Editor Affiliations
-
- 1. Télécom Bretagne (Campus Rennes)
- 2. Center for Secure Information Systems, George Mason University
- 3. École Nationale des Sciences Appliquées, Université Cadi Ayyad
- 4. Carnegie Mellon University
- Authors
-
-
Mikhail Strizhov
(5)
-
Indrajit Ray
(5)
-
Mikhail Strizhov
- Author Affiliations
-
- 5. Colorado State University, Fort Collins, CO, 80523, USA
Continue reading...
To view the rest of this content please follow the download PDF link above.