Skip to main content

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Included in the following conference series:

Abstract

Due to the convenience, economy and high scalability of cloud computing, more and more individuals and enterprises are motivated to outsource their data or computing to clouds. In this paper, we propose a privacy-preserving multi-keyword ranked search over encrypted data in hybrid cloud, which is denoted as MRSE-HC. The keyword partition vector model is presented. The keyword dictionary of documents is clustered into balanced partitions by a bisecting k-means clustering based keyword partition algorithm. In accordance with the partitions, the keyword partition based bit vectors are defined for documents and queries which are utilized as the index of searches. The private cloud filters out the candidate documents by the keyword partition based bit vectors, and then the public cloud uses the trapdoor to determine the result in the candidates. The security analysis and performance evaluation show that MRSE-HC is a privacy-preserving multi-keyword ranked search scheme for hybrid clouds and outperforms the existing scheme FMRS in terms of search efficiency.

This research was supported by the National Natural Science Foundation of China under the grant Nos. 61872197, 61572263, 61772285, 61672297 and 61872193; the Postdoctoral Science Foundation of China under the Grant No. 2019M651919; the Natural Science Foundation of Anhui Province under grant No. 1608085MF127; the Natural Research Foundation of Nanjing University of Posts and Telecommunications under the grand No. NY217119.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grzonkowski, S., Corcoran, P.M., Coughlin, T.: Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: Proceedings of the IEEE International Conference on Consumer Electronics, Berlin, Germany, pp. 83–87 (2011)

    Google Scholar 

  2. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44–55. IEEE, Oakland (2000)

    Google Scholar 

  3. Cao, N., Wang, C., Li, M., Ren, K., Lou, J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–223 (2014)

    Article  Google Scholar 

  4. Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: compressing and indexing documents and images. IEEE Trans. Inf. Theory 41(6), 79–80 (1995)

    Article  Google Scholar 

  5. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International (2009)

    Google Scholar 

  6. Li, H., Yang, Y., Luan, T., et al.: Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 13(3), 312–325 (2016)

    Article  Google Scholar 

  7. Xia, Z., Wang, X., Sun, X., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  8. Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: MUSE: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1–17 (2017)

    Article  Google Scholar 

  9. Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)

    Article  Google Scholar 

  10. Wang, B., Yu, S., Lou, W., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 2112–2120. IEEE, Piscataway (2014)

    Google Scholar 

  11. Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  12. Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. CMC: Comput. Mater. Continua 55(1), 37–57 (2018)

    Google Scholar 

  13. Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273–283 (2018)

    Google Scholar 

  14. Yu, Z.: Symmetric repositioning of bisecting K-means centers for increased reduction of distance calculations for big data clustering. In: 2016 IEEE International Conference on Big Data, Washington, DC, USA, pp. 2709–2715 (2016)

    Google Scholar 

  15. Yang , Y., Liu, J., Cai, S., Yang, S.: Fast multi-keyword semantic ranked search in cloud computing, vol. 40 (2017)

    Google Scholar 

  16. Cilibrasi, R., Vitanyi, P.M.B.: The google similarity distance. IEEE Trans. Knowl. Data Eng. 19(3), 370–383 (2007)

    Article  Google Scholar 

  17. Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)

    Book  Google Scholar 

  18. Lichman, M.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, Irvine, Calif, USA (2013)

    Google Scholar 

  19. Wang, Z., Meng, B.: A comparison of approaches to chinese word segmentation in hadoop. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, China, pp. 844–850 (2014)

    Google Scholar 

  20. Chen, C., Zhu, X., Shen, P., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Dai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dai, H., Ji, Y., Liu, L., Yang, G., Yi, X. (2019). A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics