scispace - formally typeset
Journal ArticleDOI

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

TLDR
A content-aware search scheme, which can make semantic search more smart and employ the technology of multi-keyword ranked search over encrypted cloud data as the basis against two threat models to resolve the problem of privacy-preserving smart semantic search.
Abstract
Searchable encryption is an important research area in cloud computing. However, most existing efficient and reliable ciphertext search schemes are based on keywords or shallow semantic parsing, which are not smart enough to meet with users’ search intention. Therefore, in this paper, we propose a content-aware search scheme, which can make semantic search more smart. First, we introduce conceptual graphs (CGs) as a knowledge representation tool. Then, we present our two schemes (PRSCG and PRSCG-TF) based on CGs according to different scenarios. In order to conduct numerical calculation, we transfer original CGs into their linear form with some modification and map them to numerical vectors. Second, we employ the technology of multi-keyword ranked search over encrypted cloud data as the basis against two threat models and raise PRSCG and PRSCG-TF to resolve the problem of privacy-preserving smart semantic search based on CGs. Finally, we choose a real-world data set: CNN data set to test our scheme. We also analyze the privacy and efficiency of proposed schemes in detail. The experiment results show that our proposed schemes are efficient.

read more

Citations
More filters
Journal ArticleDOI

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

TL;DR: A user authentication protocol scheme with privacy protection for IIoT is proposed and the security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks.
Journal ArticleDOI

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

TL;DR: A three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information and keeps computational efficiency, and also achieves more security and functional features.
Journal ArticleDOI

Improving Metaheuristic Algorithms With Information Feedback Models

TL;DR: This paper presents a method for reusing the valuable information available from previous individuals to guide later search by incorporating six different information feedback models into ten metaheuristic algorithms and demonstrates experimentally that the variants outperformed the basic algorithms significantly.
Journal ArticleDOI

A survey of distributed denial-of-service attack, prevention, and mitigation techniques:

TL;DR: A systematic analysis of distributed denial-of-service attacks including motivations and evolution, analysis of different attacks so far, protection techniques and mitigation techniques, and possible limitations and challenges of existing research are provided.
Journal ArticleDOI

Data collection from WSNs to the cloud based on mobile Fog elements

TL;DR: This work proposes a fog structure composed of multiple mobile sinks that significantly outperforms traditional solutions for data collection from WSNs to the Cloud and designed a detailed routing algorithm for sensors considering hops and energy consumption.
References
More filters
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book

Conceptual Structures: Information Processing in Mind and Machine

TL;DR: This book will not become a unity of the way for you to get amazing benefits at all, but, it will serve something that will let you get the best time and moment to spend for reading the book.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

TL;DR: To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design.
Book ChapterDOI

Privacy preserving keyword searches on remote encrypted data

TL;DR: This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Related Papers (5)