An Efficient Privacy-Preserving Ranked Keyword Search Method

被引:147
作者
Chen, Chi [1 ]
Zhu, Xiaojie [1 ]
Shen, Peisong [1 ]
Hu, Jiankun [2 ]
Guo, Song [3 ]
Tari, Zahir [4 ]
Zomaya, Albert Y. [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ New S Wales, Australian Def Force Acad, Sch Engn & IT, Cyber Secur Lab, Canberra, ACT 2600, Australia
[3] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[4] RMIT Univ, Sch Comp Sci, Melbourne, Vic, Australia
[5] Univ Sydney, Sch Informat Technol, Sydney, NSW 2006, Australia
关键词
Cloud computing; ciphertext search; ranked search; multi-keyword search; hierarchical clustering; security;
D O I
10.1109/TPDS.2015.2425407
中图分类号
TP301 [理论、方法];
学科分类号
080201 [机械制造及其自动化];
摘要
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume of data in data centers has experienced a dramatic growth. This will make it even more challenging to design ciphertext search schemes that can provide efficient and reliable online information retrieval on large volume of encrypted data. In this paper, a hierarchical clustering method is proposed to support more search semantics and also to meet the demand for fast ciphertext search within a big data environment. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold, and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this approach can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the authenticity of search results, a structure called minimum hash sub-tree is designed in this paper. Experiments have been conducted using the collection set built from the IEEE Xplore. The results show that with a sharp increase of documents in the dataset the search time of the proposed method increases linearly whereas the search time of the traditional method increases exponentially. Furthermore, the proposed method has an advantage over the traditional method in the rank privacy and relevance of retrieved documents.
引用
收藏
页码:951 / 963
页数:13
相关论文
共 39 条
[1]
[Anonymous], P NETW DISTR SYST SE
[2]
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[3]
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]
Brinkman, 2007, THESIS U TWENTE
[7]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[8]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[9]
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[10]
Structured Encryption and Controlled Disclosure [J].
Chase, Melissa ;
Kamara, Seny .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 :577-594