원문정보
초록
영어
Nowadays, more and more people are motivated to outsource their local data to public cloud servers for great convenience and reduced costs in data management. But in consideration of privacy issues, sensitive data should be encrypted before outsourcing, which obsoletes traditional data utilization like keyword-based document retrieval. In this paper, we present a secure and efficient multi-keyword ranked search scheme over encrypted data, which additionally supports dynamic update operations like deletion and insertion of documents. Specifically, we construct an index tree based on vector space model to provide multi-keyword search, which meanwhile supports flexible update operations. Besides, cosine similarity measure is utilized to support accurate ranking for search result. To improve search efficiency, we further propose a search algorithm based on “Greedy Depth-first Traverse Strategy”. Moreover, to protect the search privacy, we propose a secure scheme to meet various privacy requirements in the known ciphertext threat model. Experiments on the real-word dataset show the effectiveness and efficiency of proposed scheme.
목차
1. Introduction
2. Problem Formulation
2.1. The System and Threat Model
2.2. Design Goals
2.3. Notations and Preliminaries
3. DMRS Scheme
3.1. Tree-based Index Construction
3.2. Search Algorithm
3.3. Secure Scheme
3.4. Dynamic Update Operation
4. Performance Analysis
4.1. Index Construction
4.2 Trapdoor Generation
4.3. Search Efficiency
4.4. Update Efficiency
5. Conclusion
Acknowledgements
References
저자정보
참고문헌
- 1Privacy-preserving multi-keyword ranked search over encrypted cloud data네이버 원문 이동
- 2Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing네이버 원문 이동
- 3Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data네이버 원문 이동
- 4(Reference title not available)
- 5Security Challenges for the Public Cloud네이버 원문 이동
- 6(Reference title not available)
- 7(Reference title not available)
- 8Parallel and Dynamic Searchable Symmetric Encryption네이버 원문 이동
- 9(Reference title not available)
- 10(Reference title not available)
- 11Secure kNN computation on encrypted databases네이버 원문 이동
- 12Dynamic searchable symmetric encryption네이버 원문 이동
- 13Zerber+R: top-k retrieval from a confidential index네이버 원문 이동
- 14(Reference title not available)
- 15Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products네이버 원문 이동
- 16(Reference title not available)
- 17(Reference title not available)
- 18Computationally Efficient Searchable Symmetric Encryption네이버 원문 이동
- 19(Reference title not available)
- 20Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking네이버 원문 이동