Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2018, Vol. 12 Issue (3) : 593-607    https://doi.org/10.1007/s11704-016-6244-5
RESEARCH ARTICLE
Preferred search over encrypted data
Zhirong SHEN(), Jiwu SHU(), Wei XUE()
Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
 Download: PDF(642 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Cloud computing provides elastic data storage and processing services. Although existing research has proposed preferred search on the plaintext files and encrypted search, no method has been proposed that integrates the two techniques to efficiently conduct preferred and privacypreserving search over large datasets in the cloud.

In this paper, we propose a scheme for preferred search over encrypted data (PSED) that can take users’ search preferences into the search over encrypted data. In the search process, we ensure the confidentiality of not only keywords but also quantified preferences associated with them. PSED constructs its encrypted search index using Lagrange coefficients and employs secure inner-product calculation for both search and relevance measurement. The dynamic and scalable property of cloud computing is also considered in PSED. A series of experiments have been conducted to demonstrate the efficiency of the proposed scheme when deploying it in realworld scenarios.

Keywords preferred search      encrypted data      secure innerproduct calculation     
Just Accepted Date: 07 December 2016   Online First Date: 06 March 2018    Issue Date: 02 May 2018
 Cite this article:   
Zhirong SHEN,Jiwu SHU,Wei XUE. Preferred search over encrypted data[J]. Front. Comput. Sci., 2018, 12(3): 593-607.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-016-6244-5
https://academic.hep.com.cn/fcs/EN/Y2018/V12/I3/593
1 Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50–58
https://doi.org/10.1145/1721654.1721672
2 Ren Y J, Shen J, Wang J, Han J, Lee S Y. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 2015, 16(2): 317–323
3 Ma T H, Zhou J J, Tang M L, Tian Y, Dhelaan A, Rodhaan A, Lee S Y. Social network and tag sources based augmenting collaborative recommender system. IEICE transactions on Information and Systems, 2015, E98–D(4): 902–910
https://doi.org/10.1587/transinf.2014EDP7283
4 Shu J W, Shen Z R, Xue W. Shield: a stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 2014, 74(9): 2872–2883
https://doi.org/10.1016/j.jpdc.2014.06.003
5 Shu J W, Shen Z R, Xue W, Fu Y X. Secure storage system and key technologies. In: Proceedings of Asia and South Pacific Design Automation Conference. 2013, 376–383
6 Cai K, Hong C, Zhang M, Feng D G, Lv Z Q. A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science. 2013, 339–346
https://doi.org/10.1109/CloudCom.2013.51
7 Guo H, Li Z J, Mu Y, Zhang X Y. Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Science, 2011, 181(3): 628–647
https://doi.org/10.1016/j.ins.2010.09.032
8 Koutrika G, Ioannidis Y. Personalized queries under a generalized preference model. In: Proceedings of International Conference on Data Engineering. 2005, 841–852
https://doi.org/10.1109/ICDE.2005.106
9 Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829–837
10 Okamoto T, Takashima W. Hierarchical predicate encryption for innerproducts. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2009, 241–237
11 Wong W K, Cheung D W, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data. 2009, 139–152
https://doi.org/10.1145/1559845.1559862
12 Yu S C, Wang C, Ren K, Lou W J. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE International Conference on Computer Communications. 2010, 534–542
https://doi.org/10.1109/INFCOM.2010.5462174
13 Li M, Yu S C, Cao N, Lou W J. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 383–392
https://doi.org/10.1109/ICDCS.2011.55
14 Pervez Z, Awan A, Khattak A, Lee S, Huh E. Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 2013, 63(2): 538–560.
https://doi.org/10.1007/s11227-012-0829-z
15 Cao N, Yang Z Y, Wang C, Lou W J. Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 393–402
https://doi.org/10.1109/ICDCS.2011.84
16 Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 506–522
https://doi.org/10.1007/978-3-540-24676-3_30
17 Lu Y. Privacy-preserving logarithmic-time search on encrypted data in cloud. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium. 2012
18 Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 253–262
https://doi.org/10.1109/ICDCS.2010.34
19 Witten I, Moffat A, Bell T. Managing Gigabytes: Compressing and Indexing Documents and Images. San Mateo, CA: Morgan Kaufmann Publishers, 1999
20 Yan T W, Garcia-Molina H. Sift: a tool for wide-area information dissemination. In: Proceedings of USENIX Annual Technical Conference. 1995, 16–20
21 Liu W Y, Chen Z, Lin F, Zhang H J, Ma W Y. Ubiquitous media agents: a framework for managing personally accumulated multimedia files. Multimedia Systems, 2003, 9(2): 144–156
https://doi.org/10.1007/s00530-003-0085-4
22 Good N, Schafer J, Konstan J, Borchers A, Sarway B, Herlocker J, Biedl J. Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the 16th National Conference on Artificial Intelligence and 11th Conference on Innovative Applications of Artificial Intelligence. 1999, 439–446
23 Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2008, 146–162
https://doi.org/10.1007/978-3-540-78967-3_9
24 Yang X, Liu L, Global I. Principles, Methodologies, and Service- Oriented Approaches for Cloud Computing. Hershey, PA: Business Science Reference, 2013
https://doi.org/10.4018/978-1-4666-2854-0
25 Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the International Conference on Applied Cryptography and Network Security. 2004, 31–45
https://doi.org/10.1007/978-3-540-24852-1_3
26 Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 350–364
https://doi.org/10.1109/SP.2007.29
27 Stefanidis K, Drosou M, Pitoura E. PerK: personalized keyword search in relational databases through preferences. In: Proceedings of International Conference on Extending Database Technology. 2010, 585–596
https://doi.org/10.1145/1739041.1739111
28 Leubner A, Kiessling W. Personalized keyword search with partialorder preferences. In: Proceedings of Brazilian Symposium on Databases. 2002, 181–193
29 Chomicki J. Preference formulas in relational queries. ACM Transaction on Database Systems, 2003, 28(4): 427–466
https://doi.org/10.1145/958942.958946
30 Kiessling W. Foundations of preferences in database systems. In: Proceedings of International Conference on Very Large Data Bases. 2002, 311–322
https://doi.org/10.1016/B978-155860869-6/50035-4
31 Georgiadis P, Kapantaidakis I, Christophides V, Nguer E, Spyratos N. Efficient rewriting algorithms for preference queries. In: Proceedings of International Conference on Data Engineering. 2008, 1101–1110
https://doi.org/10.1109/ICDE.2008.4497519
32 Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44–55
33 Goh E J. Secure indexes. IACR Cryptology ePrint Archive, 2003
34 Bloom B. Spacetime trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426
https://doi.org/10.1145/362686.362692
35 Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proceedings of Network and Distributed System Security Symposium. 2004
36 Wang C, Cao N, Ren K, Lou WJ. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1467–1479
https://doi.org/10.1109/TPDS.2011.282
37 Wang C, Ren K, Yu S C, Urs K. Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2012, 451–459
https://doi.org/10.1109/INFCOM.2012.6195784
38 Li J,Wang Q, Wang C, Cao N, Ren K, Lou W J. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 441–445
https://doi.org/10.1109/INFCOM.2010.5462196
39 Sun W H, Wang B, Cao N, Li M, Lou W J, Hou Y, Li H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ACM Symposium on Information, Computer and Communications Security. 2013, 71–82
https://doi.org/10.1145/2484313.2484322
40 Shen Z R, Suhu J W, Xue W. Keyword search with access control over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2014, 87–92
https://doi.org/10.1109/IWQoS.2014.6914304
41 Shen Z R, Shu J W, Xue W. Preferred keyword search over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2013, 207–212
42 Li J W, Li J, Chen X F, Jia C F, Liu Z L. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of International Conference on Network and System Security. 2012, 490–502
https://doi.org/10.1007/978-3-642-34601-9_37
43 Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89–98
https://doi.org/10.1145/1180405.1180418
44 Fu Z J,Wu X L, Guan C W, Sun X M, Ren K. Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716
https://doi.org/10.1109/TIFS.2016.2596138
45 Xia Z H, Wang X H, Sun X M, Wang Q. A secure and dynamic multikeyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(2): 340–352
https://doi.org/10.1109/TPDS.2015.2401003
46 Fu Z J, Ren K, Shu J G, Sun X M, Huang F X. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(9): 2546–2559
https://doi.org/10.1109/TPDS.2015.2506573
47 Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 2015, E98–B(1): 190–200
https://doi.org/10.1587/transcom.E98.B.190
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed