Skip to main content

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

To preserve the privacy of cloud data, sensitive files are always encrypted by data owners, which let the keyword search be more difficult to the crucial applications. Thus, a secure and efficient keyword search protocol over encrypted files is required. Most of the prior keyword search works over encrypted cloud files focus on single-data-owner settings. However, there are a large number of data owners involved in real applications. To retrieve user required files, single-owner keyword search schemes need to be repeated several times to search over files encrypted by different unique private keys, which is a very costly way. To achieve high efficiency and privacy preserving in multi-data-owner scenario, we propose a Secure and Verifiable Multi-owner Ranked-keyword Search protocol, named SVMRS, in this paper. Specifically, to preserve privacy and to improve the keyword search precision, we combine a modified asymmetric scalar-product encryption function with the TFtimesIDF rule. Furthermore, to preserve the integrity of search results, we extend the SVMRS based on circular bidirection-linked list, which can make the query result verifiable. Detailed analysis and experiments show that the SVMRS can preserve the file privacy and integrity, and confirms the high efficacy and efficiency of SVMRS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing (2011)

    Google Scholar 

  2. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing-the business perspective. Decis. Support Syst. 51, 176–189 (2011)

    Article  Google Scholar 

  3. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24, 1182–1191 (2013)

    Article  Google Scholar 

  6. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23, 1467–1479 (2012)

    Article  Google Scholar 

  7. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25, 222–233 (2014)

    Article  Google Scholar 

  9. Goh, E.-J.: Secure Indexes. IACR Cryptology ePrint Archive 2003, 216 (2003)

    Google Scholar 

  10. Wong, W.K., Cheung, D.W.-l., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152. ACM (2009)

    Google Scholar 

  11. Aizawa, A.: An information-theoretic perspective of tfidf measures. Inf. Process. Manage. 39, 45–65 (2003)

    Article  MATH  Google Scholar 

  12. Shetty, J., Adibi, J.: The Enron email dataset database schema and brief statistical report. Information Sciences Institute Technical Report, University of Southern California 4 (2004)

    Google Scholar 

Download references

Acknowledgments

This work is partly supported by the Foundation Key Project of Shanghai Science and Technology Committee (No. 12JC1404500, 13JC1403503) and Start-up Fund for Talent Introduction of Shanghai University of Electric Power(No. K2015-008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinguo Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, J., Lin, Y., Wen, M., Gu, C., Yin, B. (2015). Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics