International Conference on Collaborative Computing: Networking, Applications and Worksharing

Collaborative Computing: Networking, Applications, and Worksharing pp 3-13 | Cite as

Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data

  • Daudi Mashauri
  • Ruixuan Li
  • Hongmu Han
  • Xiwu Gu
  • Zhiyong Xu
  • Cheng-zhong Xu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 163)

Abstract

To preserve data privacy and integrity, sensitive data has to be encrypted before outsourcing to the cloud server. However, this makes keyword search based on plaintext queries obsolete. Therefore, supporting efficient keyword based ranked searches over encrypted data became an open challenge. In recent years, several multi-keyword ranked search schemes have been proposed in trying to solve the posed challenge. However, most recently proposed schemes don’t address the issues regarding dynamics in the keyword dictionary. In this paper, we propose a novel scheme called A-MRSE that addresses and solves these issues. We introduce new algorithms to be used by data owners each time they make modifications that affects the size of the keyword dictionary. We conduct multiple experiments to demonstrate the effectiveness of our newly proposed scheme, and the results illustrates that the performance of A-MRSE scheme is much better that previously proposed schemes.

Keywords

Cloud computing Searchable encryption Multi-keyword query Ranked search Encrypted data 

References

  1. 1.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of INFOCOM, pp. 829–837. IEEE (2011)Google Scholar
  2. 2.
    Song D.X., Wanger, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)Google Scholar
  3. 3.
    Kiltz, E., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205–222. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE 30th International Conference in Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010)Google Scholar
  5. 5.
    Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: The 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 244–251. IEEE (2012)Google Scholar
  6. 6.
    Jiad, Y., Lu, P., Zhu, Y., Xue, G., Li, M.: Towards secure multi-keyword top-k retrieval over encrypted data. IEEE Trans. Dependable Secure Comput. 10(4), 239–250 (2013)CrossRefGoogle Scholar
  7. 7.
    Feingold, D.G., Richard, S.V.: Block diagonally dominant matrices and generalizations of the Gerchgorin Circle theorem. Pacific J. Math. 12(4), 1241–1250 (1962)MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152. ACM (2009)Google Scholar
  9. 9.
    Cohen W.W.: Enron Email Dataset. http://www.cs.cmu.edu/~enron
  10. 10.
    Hicklin, J., Moler, C., Webb, P., Boisvert, R.F., Miller B., Pozo, R., Remington, K.: JAMA: Java Matrix Package. http://www.math.nist.gov/javanumerics/jama/
  11. 11.
    Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: an Enterprise Perspective on Risks and Compliance. O’Reilly Media Inc., Sebastopol (2009)Google Scholar
  12. 12.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    Mitzenmacher, M., Chang, Y.-C.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    O’Neill, A., Bellare, M., Boldyreva, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Li, J., Wang, Q., Wang, C., Kao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of INFOCOM, pp. 1–5. IEEE (2010)Google Scholar
  16. 16.
    Tang, H., Liu, F.M., Shen, G., Jin, Y., Guo, C.: UniDrive: synergize multiple consumer cloud storage services. In: ACM/USENIX/IFIP Middleware, Vancouver, Canada (2015)Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  • Daudi Mashauri
    • 1
  • Ruixuan Li
    • 1
  • Hongmu Han
    • 1
  • Xiwu Gu
    • 1
  • Zhiyong Xu
    • 2
  • Cheng-zhong Xu
    • 3
    • 4
  1. 1.School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhanChina
  2. 2.Department of Mathematics and Computer ScienceSuffolk UniversityBostonUSA
  3. 3.Department of Electrical and Computer EngineeringWayne State UniversityDetroitUSA
  4. 4.Shenzhen Institute of Advanced TechnologyChinese Academy of ScienceShenzhenChina

Personalised recommendations