Skip to main content
Top
Published in: Mobile Networks and Applications 1/2020

02-01-2019

Confusing-Keyword Based Secure Search over Encrypted Cloud Data

Authors: Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian

Published in: Mobile Networks and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored in the cloud. In order to solve the problem, this paper presents a privacy protection scheme based on confusing keyword. Based on user history retrieval data, the choosing and embedding of confusing keyword can be selectively implemented. Different from adding random values at the end of the vectors which was generated in other schemes, the embedding time of confusing keyword is selected before the generation of vectors in this paper, so as to truly achieve “random” effect and protect user privacy. In order to eliminate the unrelated documents caused by the matching of confusing keyword, this paper proposes a secondary search scheme based on confusing keyword in scheme 2. Through the construction of two trapdoors, two screenings are performed to ensure the accuracy of the data. Experiments based on real data demonstrate the effectiveness of the two schemes in this paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
2.
go back to reference Qiu T, Zhao A, Xia F, Si W, Wu DO (2017) ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Networking 25(5):2944–2959CrossRef Qiu T, Zhao A, Xia F, Si W, Wu DO (2017) ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Networking 25(5):2944–2959CrossRef
3.
go back to reference Qiu T, Qiao R, Wu DO (2018) EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef Qiu T, Qiao R, Wu DO (2018) EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84CrossRef
5.
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data [C]. Proceedings of IEEE symposium on security and privacy, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data [C]. Proceedings of IEEE symposium on security and privacy, pp 44–55
6.
go back to reference Goh E-J (2003) Secure indexes [J]. IACR Cryptology ePrint Archive Goh E-J (2003) Secure indexes [J]. IACR Cryptology ePrint Archive
7.
go back to reference Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data [C]. Applied cryptography and network security, pp 442–455 Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data [C]. Applied cryptography and network security, pp 442–455
8.
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions [C]. Proceedings of the 13th ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions [C]. Proceedings of the 13th ACM conference on computer and communications security, pp 79–88
9.
go back to reference Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search [C]. Advances in cryptology-eurocrypt, pp 506–522CrossRef Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search [C]. Advances in cryptology-eurocrypt, pp 506–522CrossRef
10.
go back to reference Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+ r: top-k retrieval from a confidential index [C]. Proceedings of the 12th International conference on extending database technology: advances in database technology, pp 439–449 Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+ r: top-k retrieval from a confidential index [C]. Proceedings of the 12th International conference on extending database technology: advances in database technology, pp 439–449
11.
go back to reference Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search [C]. Proceedings of the 2007 ACM workshop on storage security and survivability, pp 7–12 Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search [C]. Proceedings of the 2007 ACM workshop on storage security and survivability, pp 7–12
12.
go back to reference Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data [C]. Proceedings of IEEE 30th international conference on distributed computing systems, pp 253–262 Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data [C]. Proceedings of IEEE 30th international conference on distributed computing systems, pp 253–262
13.
go back to reference Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 23(8):1467–1479CrossRef Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 23(8):1467–1479CrossRef
14.
go back to reference Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 25(1):222–233CrossRef
15.
go back to reference Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data [C]. Proceedings of international conference on cloud and service computing, pp 104–110 Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data [C]. Proceedings of international conference on cloud and service computing, pp 104–110
16.
go back to reference Zhu Y, Xu R, Takagi T (2013) Secure k-NN computation on encrypted cloud data without sharing key with query users [C]. Proceedings of international workshop on security in cloud computing, pp 55–60 Zhu Y, Xu R, Takagi T (2013) Secure k-NN computation on encrypted cloud data without sharing key with query users [C]. Proceedings of international workshop on security in cloud computing, pp 55–60
17.
go back to reference Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [C]. Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 71–82 Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [C]. Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 71–82
18.
go back to reference Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):1–1 Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):1–1
19.
go back to reference Wu X, Fu Z, Sun X (2017) Text-based searchable encryption in cloud: a survey. Journal of Internet Technology 18(1):207–213 Wu X, Fu Z, Sun X (2017) Text-based searchable encryption in cloud: a survey. Journal of Internet Technology 18(1):207–213
20.
go back to reference Bringer J, Chabanne H (2012) Embedding edit distance to enable private keyword search [J]. Human-centric Computing and Information Sciences 2(1):1–12CrossRef Bringer J, Chabanne H (2012) Embedding edit distance to enable private keyword search [J]. Human-centric Computing and Information Sciences 2(1):1–12CrossRef
21.
go back to reference Wang B, Yu S, Lou W (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [C]. Proceedings of IEEE INFOCOM, pp 2112–2120 Wang B, Yu S, Lou W (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [C]. Proceedings of IEEE INFOCOM, pp 2112–2120
23.
go back to reference Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security 13(9):2359–2371CrossRef Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security 13(9):2359–2371CrossRef
24.
go back to reference Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef
25.
go back to reference Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef
27.
go back to reference Fu Z, Sun X, Xi J (2015) Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. J Commun Netw 17(5):525–533CrossRef Fu Z, Sun X, Xi J (2015) Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. J Commun Netw 17(5):525–533CrossRef
28.
go back to reference Gao C-z, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRef Gao C-z, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88MathSciNetCrossRef
29.
go back to reference Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef
30.
go back to reference Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive Bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRef Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive Bayes learning over multiple data sources. Inf Sci 444:89–104MathSciNetCrossRef
33.
go back to reference Chen X, Weng J, Lu W, Xu J (2017) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710CrossRef Chen X, Weng J, Lu W, Xu J (2017) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710CrossRef
34.
go back to reference Lin Q, Li J, Huang Z, Chen W, Shen J (2018) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972CrossRef Lin Q, Li J, Huang Z, Chen W, Shen J (2018) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972CrossRef
35.
go back to reference Xu Z, Kang W, Li R et al (2012) Efficient multi-keyword ranked query on encrypted data in the cloud[C]. Parallel and distributed systems (ICPADS), 2012 IEEE 18th international conference on. IEEE, pp 244–251 Xu Z, Kang W, Li R et al (2012) Efficient multi-keyword ranked query on encrypted data in the cloud[C]. Parallel and distributed systems (ICPADS), 2012 IEEE 18th international conference on. IEEE, pp 244–251
36.
go back to reference Dobbertin H, Rijmen V (2005) Advanced encryption standard-AES: 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004, revised selected and invited papers [M]. Springer Science & Business Media Dobbertin H, Rijmen V (2005) Advanced encryption standard-AES: 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004, revised selected and invited papers [M]. Springer Science & Business Media
Metadata
Title
Confusing-Keyword Based Secure Search over Encrypted Cloud Data
Authors
Zhangjie Fu
Yangen Liu
Xingming Sun
Yuling Liu
Zuwei Tian
Publication date
02-01-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1195-8

Other articles of this Issue 1/2020

Mobile Networks and Applications 1/2020 Go to the issue