skip to main content
10.1145/1314313.1314316acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Confidentiality-preserving rank-ordered search

Published:29 October 2007Publication History

ABSTRACT

This paper introduces a new framework for confidentiality preserving rank-ordered search and retrieval over large document collections. The proposed framework not only protects document/query confidentiality against an outside intruder, but also prevents an untrusted data center from learning information about the query and the document collection. We present practical techniques for proper integration of relevance scoring methods and cryptographic techniques, such as order preserving encryption, to protect data collections and indices and provide efficient and accurate search capabilities to securely rank-order documents in response to a query. Experimental results on the W3C collection show that these techniques have comparable performance to conventional search systems designed for non-encrypted data in terms of search accuracy. The proposed methods thus form the first steps to bring together advanced information retrieval and secure search capabilities for a wide range of applications including managing data in government and business operations, enabling scholarly study of sensitive data, and facilitating the document discovery process in litigation.

References

  1. I.H. Witten, A. Moffett, and T.C. Bell. Managing Gigabytes, Morgan Kaufmann, 2nd ed., 1999.Google ScholarGoogle Scholar
  2. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, ``Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,'' Proc. of the ACM Comp. and Comm. Security (CCS), Oct. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. E. Robertson and K. S. Jones, ``Simple Proven Approaches to Text Retrieval,'' Technical Report TR356, Cambridge Univ. Computer Laboratory, 1997.Google ScholarGoogle Scholar
  4. R. Brinkman, J. M. Doumen, and W. Jonker, ``Using Secret Sharing for Searching in Encrypted Data,'' Workshop on Secure Data Management in a Connected World, LNCS 3178, pp. 18--27, Aug. 2004.Google ScholarGoogle Scholar
  5. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, ``Private Information Retrieval,'' J. ACM, vol. 45, no. 6, pp. 965--982, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Song, D. Wagner, and A. Perrig, ``Practical Techniques for Searches on Encrypted Data,'' IEEE Sym. on Research in Security and Privacy, pp. 44--55, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano, ``Public--key Encryption with Keyword Search,'' Proceedings of Eurocrypt, 2004.Google ScholarGoogle Scholar
  8. E-J. Goh, ``Secure Indexes,'' Cryptology ePrint Archive, Report 2003/216, 2003.Google ScholarGoogle Scholar
  9. B. Klimt and Y. Yang, ``Introducing the Enron Corpus,'' Conf. on Email and Anti-Spam (CEAS), Mountain View, CA, 2004.Google ScholarGoogle Scholar
  10. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, ``Order Preserving Encryption for Numeric Data,'' Proc. of SIGMOD, Jun. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. K. Harman, ``Common Evaluation Measures,'' in Appendix, Proceedings of Text Retrieval Conference, 2005. Available online at http://trec.nist.gov/Google ScholarGoogle Scholar
  12. N. Craswell, A. P. de Vries, and I. Soboroff, ``Overview of the TREC--2005 Enterprise Track,'' Text Retrieval Conference, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Confidentiality-preserving rank-ordered search

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      StorageSS '07: Proceedings of the 2007 ACM workshop on Storage security and survivability
      October 2007
      48 pages
      ISBN:9781595938916
      DOI:10.1145/1314313

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 October 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader