Journal ArticleDOI
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption
Reads0
Chats0
TLDR
This paper proposes a multi-phrase ranked search over encrypted cloud data, which also supports dynamic update operations, such as adding or deleting files, and used an inverted index to record the locations of keywords and to judge whether the phrase appears.Abstract:
As cloud computing becomes prevalent, more and more data owners are likely to outsource their data to a cloud server. However, to ensure privacy, the data should be encrypted before outsourcing. Symmetric searchable encryption allows users to retrieve keyword over encrypted data without decrypting the data. Many existing schemes that are based on symmetric searchable encryption only support single keyword search, conjunctive keywords search, multiple keywords search, or single phrase search. However, some schemes, i.e., static schemes, only search one phrase in a query request. In this paper, we propose a multi-phrase ranked search over encrypted cloud data, which also supports dynamic update operations, such as adding or deleting files. We used an inverted index to record the locations of keywords and to judge whether the phrase appears. This index can search for keywords efficiently. In order to rank the results and protect the privacy of relevance score, the relevance score evaluation model is used in searching process on client-side. Also, the special construction of the index makes the scheme dynamic. The data owner can update the cloud data at very little cost. Security analyses and extensive experiments were conducted to demonstrate the safety and efficiency of the proposed scheme.read more
Citations
More filters
Journal ArticleDOI
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
TL;DR: A Verifiable Dynamic Encryption with Ranked Search (VDERS) scheme that allows a user to perform top-to-top searches on a dynamic document collection and verify the correctness of the search results in a secure and efficient way is proposed.
Journal ArticleDOI
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
TL;DR: This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity, it considers three categories of personalized services, and points out which PETs best fit each personalized service category.
Journal ArticleDOI
Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
TL;DR: This paper proposes a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting that allows multiple users to perform encrypted keyword search over encrypted data and is proved secure based on the approximate-GCD problem.
Journal ArticleDOI
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment
TL;DR: This article proposes an optimal resource allocation scheme for a fog-based IIoT environment and introduces fog nodes that compete with each other to provide services for the DUs using resources from the CC.
References
More filters
Proceedings ArticleDOI
Fully homomorphic encryption using ideal lattices
TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI
Practical techniques for searches on encrypted data
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI
Software protection and simulation on oblivious RAMs
Oded Goldreich,Rafail Ostrovsky +1 more
TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
Proceedings ArticleDOI
Searchable symmetric encryption: improved definitions and efficient constructions
TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.