scispace - formally typeset
Journal ArticleDOI

Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption

Reads0
Chats0
TLDR
This paper proposes a multi-phrase ranked search over encrypted cloud data, which also supports dynamic update operations, such as adding or deleting files, and used an inverted index to record the locations of keywords and to judge whether the phrase appears.
Abstract
As cloud computing becomes prevalent, more and more data owners are likely to outsource their data to a cloud server. However, to ensure privacy, the data should be encrypted before outsourcing. Symmetric searchable encryption allows users to retrieve keyword over encrypted data without decrypting the data. Many existing schemes that are based on symmetric searchable encryption only support single keyword search, conjunctive keywords search, multiple keywords search, or single phrase search. However, some schemes, i.e., static schemes, only search one phrase in a query request. In this paper, we propose a multi-phrase ranked search over encrypted cloud data, which also supports dynamic update operations, such as adding or deleting files. We used an inverted index to record the locations of keywords and to judge whether the phrase appears. This index can search for keywords efficiently. In order to rank the results and protect the privacy of relevance score, the relevance score evaluation model is used in searching process on client-side. Also, the special construction of the index makes the scheme dynamic. The data owner can update the cloud data at very little cost. Security analyses and extensive experiments were conducted to demonstrate the safety and efficiency of the proposed scheme.

read more

Citations
More filters
Journal ArticleDOI

Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data

TL;DR: A Verifiable Dynamic Encryption with Ranked Search (VDERS) scheme that allows a user to perform top-to-top searches on a dynamic document collection and verify the correctness of the search results in a secure and efficient way is proposed.
Journal ArticleDOI

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

TL;DR: This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity, it considers three categories of personalized services, and points out which PETs best fit each personalized service category.
Journal ArticleDOI

Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting

TL;DR: This paper proposes a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting that allows multiple users to perform encrypted keyword search over encrypted data and is proved secure based on the approximate-GCD problem.
Journal ArticleDOI

Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment

TL;DR: This article proposes an optimal resource allocation scheme for a fog-based IIoT environment and introduces fog nodes that compete with each other to provide services for the DUs using resources from the CC.
References
More filters
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI

Software protection and simulation on oblivious RAMs

TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Related Papers (5)