Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data
Encrypting data before outsourcing data has become a challenge in using traditional search algorithms. Many techniques have been proposed to cater the needs. However, as cloud service has a pay-as-you-go basis, these techniques are inefficiency. In this paper we attack the challenging problem by proposing an approximate multi keyword search with multi factor ranking over encrypted cloud data. Moreover, we establish strict privacy requirements and prove that the proposed scheme is secure in terms of privacy. To the best of our knowledge, we are the first who propose approximate matching technique on semantic search. Furthermore, to improve search efficiency, we consider multi-factor ranking technique to rank a query for documents. Through comprehensive experimental analysis combined with real world data, our proposed technique shows more efficiency and can retrieve more accurate results and meanwhile improve privacy by introducing randomness in query data.
This work was partly supported by the Kennesaw State University College of Science and Mathematics the interdisciplinary Research Opportunities Program (IDROP), and the Office of the Vice President for Research (OVPR) Pilot/Seed Grant.
This was also partly supported by NSFC under No. 61772466, the Provincial Key Research and Development Program of Zhejiang, China under No. 2017C01055, the Fundamental Research Funds for the Central Universities, the Alibaba-Zhejiang University Joint Research Institute for Frontier Technologies (A.Z.F.T.) under Program No. XT622017000118, the CCF-Tencent Open Research Fund under No. AGR20160109, the National Key Research and Development Program of China (2016YFB0800201), and the Natural Science Fundation of Zhejiang Province (LY16F020016).
- 2.Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS), pp. 383–392. IEEE (2011)Google Scholar
- 3.Ji, S., Li, W., He, J., Srivatsa, M., Beyah, R.: Poster: Optimization based data de-anonymization2014. In: Poster Presented at the 35th IEEE Symposium on Security and Privacy, May, vol. 18, p. 21 (2014)Google Scholar