Computer Science ›› 2017, Vol. 44 ›› Issue (1): 149-154.doi: 10.11896/j.issn.1002-137X.2017.01.029

Previous Articles     Next Articles

Multi-keyword Ranked Search Method Based on B+ Tree

NA Hai-yang, YANG Geng and SHU Xiao-wei   

  • Online:2018-11-13 Published:2018-11-13

Abstract: For the large amount of information and the storage of encrypted privacy information in society,it has become more difficult to retrieve these information for users.Based on research and analysis of the existing searchable encryption scheme,a method of multi-keyword ranked search based on B+ tree was proposed in this paper.Specifically,the vector model is combined in the index construction and trapdoor generation,and the search results are sorted according to the relevance score and the match number of keyword.Finally,the experiments are conducted on the really dataset to demonstrate the search efficiency of the proposed scheme.

Key words: B+ Tree,Encrypted search,Multi-keyword

[1] FENG Chao-sheng,QIN Zhi-guang,YUAN Ding.Techniques of Secure Storage for Cloud Data[J].Chinese Journal of Compu-ters,2015,38(1):150-163.(in Chinese) 冯朝胜,秦志光,袁丁.数据安全存储技术[J].计算机学报,2015,8(1):150-163.
[2] SHEN Zhi-rong,XUE Wei,SHU Ji-wu.Surveyon the Research and Development of Searchable Encryption Schemes[J].Journal of Software,2014,25(4):880-895.(in Chinese) 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895.
[3] SONG D X,WAGNER D,PERRING A.Practical Techniquesfor Searches on Encrypted Data[C]∥IEEE Symposium on Security and Privacy,2000:44-55.
[4] CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:Improved definitions and efficient constructions[C]∥Proc of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:79-88.
[5] CAO Ning,WANG Cong,LI Ming,et al.Privacy-PreservingMulti-Keyword Ranked Search over Encrypted Cloud Data[C]∥Proc of INFOCOM.Shanghai:IEEE.2011:829-837.
[6] WONG W K,CHEUNG W L,KAO B,et al.Secure kNN computation on encrypted databases[C]∥Proc of SIGMOD.New York:ACM,2009:139-152.
[7] CHENG Fang-quan,PENG Zhi-yong,SONG Wei,et al.An Efficient Privacy-Preserving Rank Query over Encrypted Data in Cloud Computing[J].Chinese Journal of Computers,2012,35(11):2215-2227.(in Chinese) 程芳权,彭智勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012,35(11):2215-2227.
[8] ZHANG Wei,XIAO Sheng,LIN Ya-ping,et al.Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing[C]∥Proc of Dependable Systems and Networks (DSN).Atlanta:IEEE,2014:276-286.
[9] IBRAHIM A,JIN H,YASSIN A,et al.Secure Rank-orderedSearch of Multi-keyword Trapdoor over Encrypted Cloud Data[C]∥Proc of Services Computing Conference (APSCC).Guilin:IEEE,2012:263-270.
[10] KAMARA S,PAPAMANTHOU C.Parallel and Dynamic Sea-rchable Symmetric Encryption[M]∥Financial Cryptography and Data Security.Berlin:Springer Berlin Heidelberg,2013:258-274.
[11] XIA Zhi-hua,WANG Xin-hui,SUN Xing-ming,et al.A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2016,7(2):340-352.
[12] WANG Cong,CAO Ning,REN Kui,et al.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(8):1467-1479.
[13] SUN Wen-hai,WANG Bing,CAO Ning,et al.Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(11):3025-3035.
[14] ZHANG Wei,LIN Ya-ping,XIAO Sheng,et al.Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing[J].IEEE Transactions on Computers, 2016,5(5):1566-1577 .
[15] ZERR S,OLMEDILLA D,NEJDL W,et al.Zerber+R:Top-k retrieval from a confidential index[C]∥Proc of EDBT.New York:ACM,2009:439-449.
[16] Lucene3.5.
[17] LI Hong-wei,YANG Yi,TOM L,et al.Enabling Fine-grainedMulti-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data[J].IEEE Transactions on Dependable and Secure Computing,2016,13(3):312-325.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .