Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 365-369.

Previous Articles     Next Articles

Keyword-based Privacy-preserving Retrieval over Cloud Encrypted Data

YU Zhi-bin and ZHOU Yan-hui   

  • Online:2018-11-14 Published:2018-11-14

Abstract: More and more organizations and individuals outsource their data storage into cloud and using cloud-based services provide data management.Query providing user capabilities of accessing cloud data and obtaining information,is an important component of cloud services.Thus,how to protect both privacy of user queries and data privacy in cloud while providing query services and eventually providing query results meeting needs quickly and timely has become a vital concern.The private information retrieval (PIR) protocol allows user to perform a query from a database without revealing his private information;meanwhile the privacy of the database will be protected.Corresponding to limitations encountered in the applications of existing PIR protocol in the cloud environment and large capacity data scenario,a computational PIR protocol based on additively homomorphic encryption scheme and MapReduce was proposed.The protocol uses the batch queries method to lower the communication complexity.Further,we used proposed protocol as the building-block as well as perfect hash function tool to construct a cloud keyword-based encrypted data retrieval scheme.The scheme combines high query efficiency and the practicality of keyword-based retrieval.

Key words: Private information retrieval,Additively homomorphic encryption,Parallel query processes,Keyword-based retrieval

[1] Vouk M A.Cloud computing — Issues,research and implementations[C]∥30th International Conference on Information Technology Interfaces,2008(ITI 2008).IEEE,2008:31-40
[2] Jansen W A.Cloud Hooks:Security and Privacy Issues in Cloud Computing[J].Hawaii International Conference on System Scien-ces,2011:1-10
[3] Ren K,Wang C,Wang Q.Security Challenges for the Public Cloud[J].Internet Computing,IEEE,2012,16(1):69-73
[4] Bugiel S,Nurnberger S,Sadeghi A.Twin clouds:all architecture for secure computing [C]∥Workshop on Cryptography and Security in Clouds.Zurich,Switzerland,2011:1-l1
[5] Pearson S,Shen Y,Mowbray M.A Privacy Manager For Cloud Computing[J].Cloud Computing,2009,5931:90-106
[6] Chor B,Goldreich O,Kushilevitz E,et al.Private information retrieval[C]∥Foundations of Computer Science,1995.IEEE,1995:41-50
[7] Kushilevitz E,Ostrovsky R.Replication Is Not Needed:Single Database,Computationally-Private Information Retrieval (Extended Abstract)[C]∥PROC.of 38th Annu.IEEE Symp.on Foundation of Computer Science.1997:364-373
[8] Yoshida R,Cui Y,Sekino T,et al.Practical Searching over Encrypted Data by Private Information Retrieval[J].Global Telecommunications Conference,IEEE,2011:1-5
[9] Rafail O,William E,Skeith III.A survey of single-database private information retrieval:techniques and applications[C]∥Public Key Cryptography(PKC 2007).2007:393-411
[10] Boneh D,Kushilevitz E,Ostrovsky R,et al.Public Key Encryption That Allows PIR Queries[J].Lecture Notes in Computer Science,2007,4622:50-67
[11] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74
[12] Sion R.On the Computational Practicality of Private Information Retrieval[C]∥Proceedings of the Network and Distributed Systems Security Symposium,2007.Stony Brook Network Security and Applied Cryptography Lab Tech Report,2007
[13] Kamara S,Raykova M.Parallel Homomorphic Encryption[J].Lecture Notes in Computer Science,2011
[14] Chang Y C.Single Database Private Information Retrieval with Logarithmic Communication[C]∥Information Security and Privacy:9th Australasian Conference,Sydney,Australia,2004.Berlin,Germany:Springer,2004:50-61
[15] Pietro R D,nen M,Blass E,et al.PRISM-Privacy-Preserving Search in MapReduce[J].Privacy Enhancing Technologies,volume 7384 of Lecture Notes in Computer Science,2012
[16] Melchor C A,Crespin B,Gaborit P,et al.High-speed private information retrieval computation on GPU[C]∥IEEE SECURWARE.2008:263-272
[17] Beimel A,Ishai Y,Malkin T.Reducing the Servers Computation in Private Information Retrieval:PIR with Preprocessing[C]∥CRYPTO 2000.2000:56-74
[18] Lipmaa H.An Oblivious Transfer Protocol with Log-SquaredCommunication[C]∥Proc.Information Security Conf.(ISC ’05).2005
[19] Stern J P.A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol[J].Lecture Notes in Computer Science,1998:357-371
[20] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥UROCRYPT.1999:223-238
[21] Dean J,Ghemawat S.MapReduce:simplified data processing on large clusters[C]∥Proceedings of 6th Conference on Symposium on Operatins Systems Design and Implementation(OSDI’04).2004
[22] Ishai Y,Kushilevitz E,Ostrovsky R,et al.Batch Codes andTheir Applications[C]∥Proceedings of the 36th Annual ACM Symposium on Theory of Computing.2004:262-271
[23] Yoshida R,Cui Y,Shigetomi R,et al.The Practicality of theKeyword Search Using Pir[C]∥International Symposium on Information Theory and Its Applications(ISITA 2008).2008:1-6
[24] Botelho F C,Galinkin D,Meira W,et al.External perfect hashing for very large key sets[C]∥Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Mana(CIKM ’07).2007:653-662
[25] Botelho F C,Lacerda A,Menezes G V,et al.Minimal perfect hashing:A competitive method for indexing internal memory[J].Information Sciences,2011,181(13):2608-2625

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!