Advertisement

Confusing-Keyword Based Secure Search over Encrypted Cloud Data

  • Zhangjie Fu
  • Yangen Liu
  • Xingming Sun
  • Yuling Liu
  • Zuwei Tian
Article
  • 31 Downloads

Abstract

As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored in the cloud. In order to solve the problem, this paper presents a privacy protection scheme based on confusing keyword. Based on user history retrieval data, the choosing and embedding of confusing keyword can be selectively implemented. Different from adding random values at the end of the vectors which was generated in other schemes, the embedding time of confusing keyword is selected before the generation of vectors in this paper, so as to truly achieve “random” effect and protect user privacy. In order to eliminate the unrelated documents caused by the matching of confusing keyword, this paper proposes a secondary search scheme based on confusing keyword in scheme 2. Through the construction of two trapdoors, two screenings are performed to ensure the accuracy of the data. Experiments based on real data demonstrate the effectiveness of the two schemes in this paper.

Keywords

Confusing keyword Searchable encryption Privacy protection Wireless network 

Notes

Acknowledgments

This work is supported by the National Natural Science Foundation of China under grant U1836110, 61772283, U1536206, U1405254, 61602253, 61672294, 61502242; by the National Key R&D Program of China under grant 2018YFB1003205; by China Postdoctoral Science Foundation (2017M610574); by The Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Major Program of the National Social Science Fund of China (17ZDA092), Qing Lan Project, Meteorology Soft Sciences Project; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

References

  1. 1.
    Zhangjie F, Xu J, Zhu Z, Liu AX, Sun X Writing in the air with WiFi signals for virtual reality devices. IEEE Trans Mob Comput.  https://doi.org/10.1109/TMC.2018.2831709
  2. 2.
    Qiu T, Zhao A, Xia F, Si W, Wu DO (2017) ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Networking 25(5):2944–2959CrossRefGoogle Scholar
  3. 3.
    Qiu T, Qiao R, Wu DO (2018) EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRefGoogle Scholar
  4. 4.
    Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: a survey. IEEE Communications Surveys and Tutorials.  https://doi.org/10.1109/COMST.2018.2803740
  5. 5.
    Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data [C]. Proceedings of IEEE symposium on security and privacy, pp 44–55Google Scholar
  6. 6.
    Goh E-J (2003) Secure indexes [J]. IACR Cryptology ePrint ArchiveGoogle Scholar
  7. 7.
    Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data [C]. Applied cryptography and network security, pp 442–455Google Scholar
  8. 8.
    Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions [C]. Proceedings of the 13th ACM conference on computer and communications security, pp 79–88Google Scholar
  9. 9.
    Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search [C]. Advances in cryptology-eurocrypt, pp 506–522Google Scholar
  10. 10.
    Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+ r: top-k retrieval from a confidential index [C]. Proceedings of the 12th International conference on extending database technology: advances in database technology, pp 439–449Google Scholar
  11. 11.
    Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search [C]. Proceedings of the 2007 ACM workshop on storage security and survivability, pp 7–12Google Scholar
  12. 12.
    Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data [C]. Proceedings of IEEE 30th international conference on distributed computing systems, pp 253–262Google Scholar
  13. 13.
    Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 23(8):1467–1479CrossRefGoogle Scholar
  14. 14.
    Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 25(1):222–233CrossRefGoogle Scholar
  15. 15.
    Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data [C]. Proceedings of international conference on cloud and service computing, pp 104–110Google Scholar
  16. 16.
    Zhu Y, Xu R, Takagi T (2013) Secure k-NN computation on encrypted cloud data without sharing key with query users [C]. Proceedings of international workshop on security in cloud computing, pp 55–60Google Scholar
  17. 17.
    Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [C]. Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 71–82Google Scholar
  18. 18.
    Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):1–1Google Scholar
  19. 19.
    Wu X, Fu Z, Sun X (2017) Text-based searchable encryption in cloud: a survey. Journal of Internet Technology 18(1):207–213Google Scholar
  20. 20.
    Bringer J, Chabanne H (2012) Embedding edit distance to enable private keyword search [J]. Human-centric Computing and Information Sciences 2(1):1–12CrossRefGoogle Scholar
  21. 21.
    Wang B, Yu S, Lou W (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [C]. Proceedings of IEEE INFOCOM, pp 2112–2120Google Scholar
  22. 22.
    Fu Z, Wu X, Wang Q, Ren K Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Transactions on Information Forensics and Security.  https://doi.org/10.1109/TIFS.2017.2730365
  23. 23.
    Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security 13(9):2359–2371CrossRefGoogle Scholar
  24. 24.
    Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRefGoogle Scholar
  25. 25.
    Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRefGoogle Scholar
  26. 26.
    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl.  https://doi.org/10.1016/j.jnca.2018.03.006
  27. 27.
    Fu Z, Sun X, Xi J (2015) Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. J Commun Netw 17(5):525–533CrossRefGoogle Scholar
  28. 28.
    Gao C-z, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRefGoogle Scholar
  29. 29.
    Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRefGoogle Scholar
  30. 30.
    Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive Bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRefGoogle Scholar
  31. 31.
    Weng J, Weng J, Zhang Y, Luo W, Lan W (2018) BENBI: Scalable and dynamic access control on the northbound interface of SDN-based VANET. IEEE Trans Veh Technol.  https://doi.org/10.1109/TVT.2018.2880238
  32. 32.
    Yang A, Xu J, Weng J, Zhou J, Wong DS (2018) Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage. IEEE Transactions on Cloud Computing.  https://doi.org/10.1109/TCC.2018.2851256
  33. 33.
    Chen X, Weng J, Lu W, Xu J (2017) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710Google Scholar
  34. 34.
    Lin Q, Li J, Huang Z, Chen W, Shen J (2018) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972Google Scholar
  35. 35.
    Xu Z, Kang W, Li R et al (2012) Efficient multi-keyword ranked query on encrypted data in the cloud[C]. Parallel and distributed systems (ICPADS), 2012 IEEE 18th international conference on. IEEE, pp 244–251Google Scholar
  36. 36.
    Dobbertin H, Rijmen V (2005) Advanced encryption standard-AES: 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004, revised selected and invited papers [M]. Springer Science & Business MediaGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Zhangjie Fu
    • 1
    • 2
  • Yangen Liu
    • 1
  • Xingming Sun
    • 1
  • Yuling Liu
    • 3
  • Zuwei Tian
    • 4
  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.College of information science and technologyJinan UniversityGuangzhouChina
  3. 3.College of Computer Science and Electronic EngineeringHunan UniversityChangshaChina
  4. 4.School of Information Science and EngineeringHunan First Normal UniversityChangshaChina

Personalised recommendations