Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud

  • Lili Xia
  • Zhangjie Fu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11058)


With the rapid development of the IoT and the mobile applications, users are tending to outsource the data to the cloud servers. Thus, the encrypted data search on the cloud is very important. Now there are a lot existed keyword search schemes in which the relationship between the size of the file set and the search time is linear. In order to solve this problem, we propose a semantic retrieval framework for central word expansion based on two-level index. In this paper, we have taken a new approach for index construction - the two-level index to ensure that the retrieval time is not affected by the file size. In order to better meet the semantic requirements of user queries, we introduced the central word expansion technology to further improve the accuracy of the search. The main idea of central keyword extension semantic search (CKESS) based on two-level index is that match the expanded central keyword with index firstly, then compute the similarity between the query and the index under the first matching result, and finally return the result with the highest similarity. Our proposed solution meets the privacy protection requirements under two different threat models. Through the experiment of the real data set, we prove that our scheme is efficient, accurate and secure.


Two-level index Central word expansion Semantic search 



This work is supported by the NSFC (61772283, 61672294, U1536206, 61502242, U1405254, 61602253), BK20150925, R2017L05, PAPD fund, Project funded by China Postdoctoral Science Foundation, Major Program of the National Social Science Fund of China (17ZDA092), Qing Lan Project, and Meteorology Soft Sciences Project.


  1. 1.
    Goh, E.J.: Secure indexes. Submission (2003)Google Scholar
  2. 2.
    Sun, W., Wang, B., Cao, N., Li, M., Lou, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)CrossRefGoogle Scholar
  3. 3.
    Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. J. Cryptol. 26(2), 192–224 (2013)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)CrossRefGoogle Scholar
  5. 5.
    Cao, N., Wang, C., Li, M.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  6. 6.
    Har-Peled, S., Indyk, P., Motwani, R.: Approximate nearest neighbor: towards removing the curse of dimensionality. In: ACM Symposium on Theory of Computing, pp. 604–613 (1998)Google Scholar
  7. 7.
    Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRefGoogle Scholar
  8. 8.
    Miller, G.A., Beckwith, R., Fellbaum, C., Gross, D., Miller, K.J.: Introduction to WordNet: an on-line lexical database*. Int. J. Lexicogr. 3(4), 235–244 (1990)CrossRefGoogle Scholar
  9. 9.
    Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRefGoogle Scholar
  10. 10.
    Lin, D.: An information-theoretic definition of similarity. In: Fifteenth International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., pp. 296–304 (1998)Google Scholar
  11. 11.
    Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data. ACM, pp. 139–152 (2009)Google Scholar
  12. 12.
    Yang, J., Liu, Z., Li, J., Jia, C., Cui, B.: Multi-key searchable encryption without random Oracle. In: International Conference on Intelligent NETWORKING and Collaborative Systems. IEEE, pp. 79–84 (2015)Google Scholar
  13. 13.
    Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of LargeScale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2014)CrossRefGoogle Scholar
  14. 14.
    Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: Communications and Network Security, pp. 182–190. IEEE (2015)Google Scholar
  15. 15.
    Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Conference on Information Communications, pp. 441–445. IEEE Press (2010)Google Scholar
  16. 16.
    Chuah, M., Hu, W.: Privacy-aware BedTree based solution for fuzzy multi-keyword search over encrypted data. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, pp. 273–281 (2011)Google Scholar
  17. 17.
    Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: IEEE International Conference on Data Engineering, pp. 1156–1167. IEEE (2012)Google Scholar
  18. 18.
    Wang, J., Yu, X., Zhao, M.: Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query. Arab. J. Sci. Eng. 40(8), 2375–2388 (2015)CrossRefGoogle Scholar
  19. 19.
    Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Security 11(12), 2706–2716 (2017)CrossRefGoogle Scholar
  20. 20.
    Sun, X., Zhu, Y., Xia, Z., et al.: Secure keyword-based ranked semantic search over encrypted cloud data. In: The International Conference on Multimedia, Computer Graphics and Broadcasting, pp. 271–283 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Lili Xia
    • 1
  • Zhangjie Fu
    • 1
  1. 1.Nanjing University of Information Science and TechnologyNanjingChina

Personalised recommendations