Abstract
In cloud computing, data owners outsource their data to clouds for saving cost of data storage and computation. However, while enjoying the benefits of cloud computing, users have to face the risk that sensitive outsourced data could be leaked. This paper proposes a privacy-preserving multi-keyword ranked search scheme over encrypted cloud data, which adopts a novel two-layer complete binary tree index structure. The upper layer index is used to filter the candidate documents while the lower layer index is used to prune those unqualified documents, and then the search result is efficiently determined. Security analysis is presented which indicates that the proposed scheme is capable of preserving the privacy of outsourced data. Experiment results show that the proposed scheme has good performance in terms of search time cost.
Supported by the National Natural Science Foundation of China under the grant Nos. 61872197, 61972209, 61572263, 61672297 and 61872193; the Postdoctoral Science Foundation of China under the Grand No. 2019M651919; the Natural Research Foundation of NJUPT under the grand No. NY217119.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Linthicum, D.S.: Approaching cloud computing performance. IEEE Cloud Comput. 5(2), 33–36 (2018)
Bösch, C., Hartel, P.H., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47(2), 18:1–18:51 (2014)
Song, D.X., Wagner, D.A., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 44–55 (2000)
Goh, E.: Secure indexes. IACR Cryptology ePrint Archive 2003, 216 (2003)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2011, 10–15 April 2011, pp. 829–837, Shanghai (2011)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June–2 July 2009, pp. 139–152 (2009)
Cheruku, H., Subhashini, P.: Ranked search over encrypted cloud data in Azure using secure K-NN. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics. AISC, vol. 654, pp. 341–350. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-6620-7_33
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)
Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016, pp. 845–851 (2016)
Deepa, N., Vijayakumar, P., Rawal, B.S., Balamurugan, B.: An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: 2017 IEEE International Conference on Smart Cloud, SmartCloud 2017, New York City, NY, USA, 3–5 November 2017, pp. 149–154 (2017)
Guo, Z., Zhang, H., Sun, C., Wen, Q., Li, W.: Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J. Syst. Softw. 137, 380–395 (2018)
Yao, X., Lin, Y., Liu, Q., Zhang, J.: Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access 6, 3809–3823 (2018)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
Sun, W., et al.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)
Wan, Z., Deng, R.H.: VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 15(6), 1083–1095 (2018)
Bulut, M.: ReducedCBT and superCBT, two new and improved complete binary tree structures, CoRR, vol. abs/1401.7741 (2014)
B.D.: New York times dataset [db/ol] (2018). http://developer.nytimes.com/docs
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Bao, J., Dai, H., Yang, M., Yi, X., Yang, G., Liu, L. (2020). PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. In: Wen, S., Zomaya, A., Yang, L.T. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science(), vol 11945. Springer, Cham. https://doi.org/10.1007/978-3-030-38961-1_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-38961-1_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38960-4
Online ISBN: 978-3-030-38961-1
eBook Packages: Computer ScienceComputer Science (R0)