Nothing Special   »   [go: up one dir, main page]

Skip to main content

Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud

  • Conference paper
  • First Online:
Network and System Security (NSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11058))

Included in the following conference series:

  • 1547 Accesses

Abstract

With the rapid development of the IoT and the mobile applications, users are tending to outsource the data to the cloud servers. Thus, the encrypted data search on the cloud is very important. Now there are a lot existed keyword search schemes in which the relationship between the size of the file set and the search time is linear. In order to solve this problem, we propose a semantic retrieval framework for central word expansion based on two-level index. In this paper, we have taken a new approach for index construction - the two-level index to ensure that the retrieval time is not affected by the file size. In order to better meet the semantic requirements of user queries, we introduced the central word expansion technology to further improve the accuracy of the search. The main idea of central keyword extension semantic search (CKESS) based on two-level index is that match the expanded central keyword with index firstly, then compute the similarity between the query and the index under the first matching result, and finally return the result with the highest similarity. Our proposed solution meets the privacy protection requirements under two different threat models. Through the experiment of the real data set, we prove that our scheme is efficient, accurate and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Goh, E.J.: Secure indexes. Submission (2003)

    Google Scholar 

  2. Sun, W., Wang, B., Cao, N., Li, M., Lou, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)

    Article  Google Scholar 

  3. Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. J. Cryptol. 26(2), 192–224 (2013)

    Article  MathSciNet  Google Scholar 

  4. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Article  Google Scholar 

  5. Cao, N., Wang, C., Li, M.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  6. Har-Peled, S., Indyk, P., Motwani, R.: Approximate nearest neighbor: towards removing the curse of dimensionality. In: ACM Symposium on Theory of Computing, pp. 604–613 (1998)

    Google Scholar 

  7. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)

    Article  Google Scholar 

  8. Miller, G.A., Beckwith, R., Fellbaum, C., Gross, D., Miller, K.J.: Introduction to WordNet: an on-line lexical database*. Int. J. Lexicogr. 3(4), 235–244 (1990)

    Article  Google Scholar 

  9. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)

    Article  Google Scholar 

  10. Lin, D.: An information-theoretic definition of similarity. In: Fifteenth International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., pp. 296–304 (1998)

    Google Scholar 

  11. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data. ACM, pp. 139–152 (2009)

    Google Scholar 

  12. Yang, J., Liu, Z., Li, J., Jia, C., Cui, B.: Multi-key searchable encryption without random Oracle. In: International Conference on Intelligent NETWORKING and Collaborative Systems. IEEE, pp. 79–84 (2015)

    Google Scholar 

  13. Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of LargeScale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69–78 (2014)

    Article  Google Scholar 

  14. Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: Communications and Network Security, pp. 182–190. IEEE (2015)

    Google Scholar 

  15. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Conference on Information Communications, pp. 441–445. IEEE Press (2010)

    Google Scholar 

  16. Chuah, M., Hu, W.: Privacy-aware BedTree based solution for fuzzy multi-keyword search over encrypted data. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, pp. 273–281 (2011)

    Google Scholar 

  17. Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: IEEE International Conference on Data Engineering, pp. 1156–1167. IEEE (2012)

    Google Scholar 

  18. Wang, J., Yu, X., Zhao, M.: Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query. Arab. J. Sci. Eng. 40(8), 2375–2388 (2015)

    Article  Google Scholar 

  19. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Security 11(12), 2706–2716 (2017)

    Article  Google Scholar 

  20. Sun, X., Zhu, Y., Xia, Z., et al.: Secure keyword-based ranked semantic search over encrypted cloud data. In: The International Conference on Multimedia, Computer Graphics and Broadcasting, pp. 271–283 (2013)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the NSFC (61772283, 61672294, U1536206, 61502242, U1405254, 61602253), BK20150925, R2017L05, PAPD fund, Project funded by China Postdoctoral Science Foundation, Major Program of the National Social Science Fund of China (17ZDA092), Qing Lan Project, and Meteorology Soft Sciences Project.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xia, L., Fu, Z. (2018). Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud. In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02744-5_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02743-8

  • Online ISBN: 978-3-030-02744-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics