earticle

논문검색

Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment

초록

영어

With the increasing popularity of cloud computing, more and more sensitive or private information has been outsourced onto the cloud server. For protecting data privacy, sensitive data usually has to be encrypted before outsourcing, which makes traditional search techniques based on plaintext useless. In response to the search over encrypted data, searchable encryption is a good solution in Information Security. However, most of existing searchable encryption schemes only support exact keyword search. That means they don’t support searching for different variants of the query word, which is a significant drawback and greatly affects data usability and user experience. Recently, a fuzzy keyword search scheme proposed by some researchers aims at addressing the problems of minor typos and format inconsistence but couldn’t solve the problem above. In this paper, we formalize the problem of semantic keyword-based search over encrypted cloud data while preserving privacy. Semantic keyword-based search will greatly improves the user experience by returning all the documents containing semantically close keywords related to the query word. In our solution, we use the stemming algorithm to construct stem set, which reduces the dimension of index. And the symbol-based trie is also adopted in index construction to improve the search efficiency. Through rigorous privacy analysis and experiment on real dataset, our scheme is secure and efficient.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Problem Formulation
  3.1. System Model
  3.2. Threat Model
  3.3. Design Goals
  3.4. Notations
  3.5. Preliminaries
 4. Construction of Semantic Keyword-based Search
  4.1. Stem Set Construction
  4.2. The Efficient Semantic Keyword-based Search Scheme
 5. Privacy Analysis
 6. Performance Analysis
  6.1. Stemming Process
  6.2. Index Construction
  6.3. Query Generation
  6.4. Search
 7. Conclusion
 Acknowledgements
 References

저자정보

  • Jiangang Shu School of Computer and Software & Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
  • Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
  • Lu Zhou School of Computer and Software & Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
  • Jin Wang School of Computer and Software & Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.