Advertisement

A Ciphertext Data Retrieval Method Based on Cloud Storage

  • Shuo Zheng
  • Siyang Wang
  • Cong Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Abstract

For the problem of mass data encryption retrieval in the cloud storage system, a three-step ciphertext data retrieval method is proposed. In this method, we introduce inverted index as the index structure, adopt the fully homomorphic and privacy homomorphism encryption algorithm and design a three-step retrieval strategy. The first step matches on the ciphertext index precisely, and the other two extend the word into other forms and correct the wrong word to query again. The latter two steps will be executed under the circumstance that the returned result is lower than the pre-set threshold. This ciphertext data retrieval method based on cloud storage improve the privacy of stored data and makes every effort to render users obtain the result they expect. The proof shows it is effective.

Keywords

inverted index metadata encryption algorithm 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Shen, J.: Research of Cloud Storage and Its Security. J. Computer Knowledge and Technology 7, 3829–3832 (2011)Google Scholar
  3. 3.
    Huang, Y., Zhang, J., Li, X.: Encrypted Storage and Its Retrieval in Cloud Storage Applications. J. ZTE Communication 16, 33–35 (2010)Google Scholar
  4. 4.
    Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: The IEEE Symposium on Security and Privacy(S&P 2000), pp. 44–55. IEEE, Piscataway (2000)Google Scholar
  5. 5.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73–86. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Guo, L., Yao, H.: Research on Encrypted Database Search Method based on Inverted Index. J. Computer Science 9, 13–15 (2010)Google Scholar
  8. 8.
    Liang, Y., Lu, J., Liu, L., Zhang, C.: Vague-keyword Search under Encrypted Environment in Cloud Computing. J. Computer Science 38, 99–100 (2011)Google Scholar
  9. 9.
    Zhao, X., Ye, Z.: Research and Comparison of Several Database Encryption Technologies. J. Computer Technology and Development 17, 219–222 (2007)Google Scholar
  10. 10.
    Dai, Y., Shang, J., Su, Z.: Quick Index on Encrypted Database. J. Journal of Tsinghua University (Sci. & Tech.) 37, 24–27 (1997)Google Scholar
  11. 11.
    Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphism. In: DeMillo, R.D. (ed.) Foundations of Secure Computations, pp. 169–177. Academic Press (1978)Google Scholar
  12. 12.
    Swaminathan, A., Mao, Y., Su, G.M., et al.: Confidentiality-Preserving Rank-Ordered Search. In: The 2007 ACM Workshop on Storage Security and Survivability (StorageSS 2007), pp. 7–12. ACM, New York (2007)CrossRefGoogle Scholar
  13. 13.
    Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: The 41st Annual ACM Symposium on Theory of Computing (STOC 2009), pp. 169–178. ACM, New York (2009)CrossRefGoogle Scholar
  14. 14.
    Norvig, P.: How to Write a Spelling Corrector, http://norvig.com/spell-correct.html
  15. 15.
    Wang, X., Shangping, W., Qin, B.: Research on Database Encrypt ion and Verification Methods. Journal of Xi’an University of Technology 18, 263–268 (2002)Google Scholar
  16. 16.
    Levenshtein: О границах для упаковок в n-мерном евклидовом пространстве. Doklady Akademii Nauk SSR  245, 1299–1303 (1979)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Shuo Zheng
    • 1
  • Siyang Wang
    • 1
  • Cong Wang
    • 1
  1. 1.Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijingChina

Personalised recommendations