Skip to main content
Top

2019 | OriginalPaper | Chapter

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data

Authors : Maohu Yang, Hua Dai, Jingjing Bao, Xun Yi, Geng Yang

Published in: Network and Parallel Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With searchable encryptions in the cloud computing, users can outsource their sensitive data in ciphertext to the cloud that provides efficient and privacy-preserving multi-keyword top-k searches. However, most existing top-k search schemes over encrypted cloud data are the centralize schemes which are limited in large scale data environment. To support scalable searches, we propose a parallel multi-keyword top-k search scheme over encrypted cloud data. In this scheme, the fragment-based encrypted inverted index is designed, which is indistinguishable and can be used for parallel searching. On the basis of such indexes, a Map-Reduce-based distributed computing framework is adopted to implement the parallel multi-keyword top-k search algorithms. Security analysis and experiment evaluation show that the proposed scheme is privacy-preserving, efficient and scalable.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference González, L.M.V., Rodero-Merino, L., Caceres, J., Lindner, M.A.: A break in the clouds: towards a cloud definition. Comput. Commun. Rev. 39(1), 50–55 (2008)CrossRef González, L.M.V., Rodero-Merino, L., Caceres, J., Lindner, M.A.: A break in the clouds: towards a cloud definition. Comput. Commun. Rev. 39(1), 50–55 (2008)CrossRef
3.
go back to reference Song, D.X., Wagner, D.A., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 44–55, May 2000 Song, D.X., Wagner, D.A., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 44–55, May 2000
4.
go back to reference Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, vol. 2003, p. 216 (2003) Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, vol. 2003, p. 216 (2003)
5.
go back to reference Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R. : Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, pp. 79–88 (2006) Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R. : Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, pp. 79–88 (2006)
6.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2011, pp. 829–837, April 2011 Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2011, pp. 829–837, April 2011
7.
go back to reference Sun, W., Wang, B., Cao, N., Li, M., Lou, W.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)CrossRef Sun, W., Wang, B., Cao, N., Li, M., Lou, W.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)CrossRef
8.
go back to reference Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRef
9.
go back to reference Jiang, X., Yu, J., Yan, J., Hao, R.: Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403, 22–41 (2017)CrossRef Jiang, X., Yu, J., Yan, J., Hao, R.: Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403, 22–41 (2017)CrossRef
10.
go back to reference Chen, C., Zhu, X., Shen, P., Hu, J., Guo, S.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)CrossRef Chen, C., Zhu, X., Shen, P., Hu, J., Guo, S.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)CrossRef
11.
go back to reference Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: MUSE: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1 923 476:1–1 923 476:17 (2017)CrossRef Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: MUSE: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1 923 476:1–1 923 476:17 (2017)CrossRef
12.
go back to reference Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef
13.
go back to reference Ge, X., Yu, J., Hu, C., Zhang, H., Hao, R.: Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6, 45 725–45 739 (2018)CrossRef Ge, X., Yu, J., Hu, C., Zhang, H., Hao, R.: Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6, 45 725–45 739 (2018)CrossRef
14.
go back to reference Guo, C., Zhuang, R., Chang, C., Yuan, Q.: Dynamic multi-keyword ranked search based on bloom filter over encrypted cloud data. IEEE Access 7, 35 826–35 837 (2019)CrossRef Guo, C., Zhuang, R., Chang, C., Yuan, Q.: Dynamic multi-keyword ranked search based on bloom filter over encrypted cloud data. IEEE Access 7, 35 826–35 837 (2019)CrossRef
15.
go back to reference Sun, W., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, pp. 71–82, May 2013 Sun, W., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, pp. 71–82, May 2013
16.
go back to reference Yang, Y., Zhan, Y., Liu, J., Liu, X., Yuan, F., Zhong, S.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137–158 (2019) Yang, Y., Zhan, Y., Liu, J., Liu, X., Yuan, F., Zhong, S.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137–158 (2019)
17.
go back to reference Zhang, R., Xue, R., Yu, T., Liu, L.: Dynamic and efficient private keyword search over inverted index-based encrypted data. ACM Trans. Internet Technol. 16(3), 21:1–21:20 (2016)CrossRef Zhang, R., Xue, R., Yu, T., Liu, L.: Dynamic and efficient private keyword search over inverted index-based encrypted data. ACM Trans. Internet Technol. 16(3), 21:1–21:20 (2016)CrossRef
18.
go back to reference Wang, H., Dong, X., Cao, Z.: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-To-Peer Netw. Appl. 12(1), 32–42 (2019)CrossRef Wang, H., Dong, X., Cao, Z.: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-To-Peer Netw. Appl. 12(1), 32–42 (2019)CrossRef
Metadata
Title
A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data
Authors
Maohu Yang
Hua Dai
Jingjing Bao
Xun Yi
Geng Yang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-30709-7_14

Premium Partner