Computer Science ›› 2019, Vol. 46 ›› Issue (1): 6-12.doi: 10.11896/j.issn.1002-137X.2019.01.002

• Surveys • Previous Articles     Next Articles

Research on Multi-keyword Ranked Search over Encrypted Cloud Data

DAI Hua1,2, LI Xiao1, ZHU Xiang-yang1, YANG Geng1,2, YI Xun3   

  1. (College of Computer Science & Technology,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)1
    (Jiangsu Key Laboratory of Big Data Security & Intelligent Processing,Nanjing 210023,China)2
    (School of Science,Royal Melbourne Institute of Technology University,Melbourne 3000,Australia)3
  • Received:2018-02-28 Online:2019-01-15 Published:2019-02-25

Abstract: With the extensive development of cloud computing,storage and/or computing outsourcing services are becoming more and more acceptable nowadays.To protect the privacy of outsourced data,the privacy-preserving multi-keyword ranked search scheme over encrypted cloud data is focused by researches,which turns to be a hot spot recently.This paper introduced the system model and threat model of existing work,and gave the problem description about privacy-preserving,search efficiency and accuracy,search result completeness,etc.Typical works and extended research about multi-keyword ranked search were studied,and the main ideas of those methods were discussed in detail.Finally,the conclusions about current works were given,and the future research directions were proposed simultaneously.

Key words: Outsourced cloud, Data privacy, Multi-keyword search, Encrypted data search, Ranked search

CLC Number: 

  • TP309.7
[1]LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese)<br /> 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.<br /> [2]ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,27(6):1328-1348.(in Chinese)<br /> 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.<br /> [3]HASHIZUME K,ROSADO D G,FERNNDEZ-MEDINA E,et al.An analysis of security issues for cloud computing[J].Journal of Internet Services and Applications,2013,4(1):1-13.<br /> [4]FERNANDES D A B,SOARES L F B,GOMES J V,et al.Security issues in cloud environments:a survey[J].International Journal of Information Security,2014,13(2):113-170.<br /> [5]ESPOSITO C,CASTIGLIONE A,POP F,et al.Challenges of Connecting Edge and Cloud Computing:A Security and Forensic Perspective[J].IEEE Cloud Computing,2017,4(2):13-17.<br /> [6]MIAO Y,MA J,LIU X,et al.m2-ABKS:Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting[J].Journal of Medical Systems,2016,40(11):1-12.<br /> [7]ZHANG L L,ZHANG Y Q,LIU X F,et al.Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records[J].Journal of Software,2016,27(6):1577-1591.(in Chinese)<br /> 张丽丽,张玉清,刘雪峰,等.对加密电子医疗记录有效的连接关键词的搜索[J].软件学报,2016,27(6):1577-1591.<br /> [8]YANG Y,MA M.Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for ehealth clouds[J].IEEE Transactions on Information Forensics and Security,2016,11(4):746-759.<br /> [9]WANG G F,LIU C Y,PAN H Z,et al.Survey on Insider Threats to Cloud Computing[J].Chinese Journal of Computers,2017,40(2):296-316.(in Chinese)<br /> 王国峰,刘川意,潘鹤中,等.云计算模式内部威胁综述[J].计算机学报,2017,40(2):296-316.<br /> [10]TIAN H L,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Compu-ters,2017,40(10):2245-2270.(in Chinese)<br /> 田洪亮,张勇,李超,等.云环境下数据库机密性保护技术研究综述[J].计算机学报,2017,40(10):2245-2270.<br /> [11]KHALIL I M,KHREISHAH A,AZEEM M.Cloud computing security:a survey[J].Computers,2014,3(1):1-35.<br /> [12]SINGH S,JEONG Y S,PARK J H.A survey on cloud computing security:Issues,threats,and solutions[J].Journal of Network and Computer Applications,2016,75(1):200-222.<br /> [13]LI J W,JIA C F,LIU Z L,et al.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128.(in Chinese)<br /> 李经纬,贾春福,刘哲理,等.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128.<br /> [14]DONG X L,ZHOU J,CAO Z F,et al.Research Advances on Secure Searchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120.(in Chinese)<br /> 董晓蕾,周俊,曹珍富,等.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120.<br /> [15]CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data[C]//30th IEEE Annual Conference on Computer Communications (INFOCOM).IEEE,2011:829-837.<br /> [16]WONG W K,CHEUNG D W,KAO B,et al.Secure knn computation on encrypted databases[C]//2009 ACM SIGMOD International Conference on Management of Data.ACM,2009:139-152.<br /> [17]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Tran-sactions on Parallel and Distributed Systems,2014,25(1):222-233.<br /> [18]FU Z,SUN X,LIU Q,et al.Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing [J].IEICE Transactions on Communications,2015,98(1):190-200.<br /> [19]SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-basedran-king[C]//8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:71-82.<br /> [20]XIA Z,WANG X,SUN X,et al.A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.<br /> [21]SALTON G,HARMAN D.Information retrieval[M].New<br /> York:John Wiley and Sons Ltd.,2003.<br /> [22]CHEN C,ZHU X J,SHEN P S,et al.An Efficient Privacy-Preserving Ranked Keyword Search Method[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(4):951-963.<br /> [23]ZHU X Y,DAI H,YI X,et al.MUSE:An Efficient and Accurate Verifiable Privacy-preserving Multi-Keyword Text Search over Encrypted Cloud Data[J].Security and Communication Networks,2017,2017(2):1-17.<br /> [24]LI J,WANG Q,WANG C,et al.Fuzzy Keyword Search over<br /> Encrypted Data in Cloud Computing[J].International Journal of Engineering Research and Applications,2014,4(7):441-445.<br /> [25]WANG C,REN K,YU S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[C]//31st IEEE Conference on Computer Communications(INFOCOM).IEEE,2012:451-459.<br /> [26]LI J G,TIAN X X,ZHOU A Y,et al.Privacy Preserving Fuzzy Keyword Search in Database as a Service Paradigm[J].Chinese Journal of Computers,2016,39(2):414-428.(in Chinese)<br /> 李晋国,田秀霞,周傲英,等.面向DaaS保护隐私的模糊关键词查询[J].计算机学报,2016,39(2):414-428.<br /> [27]YANG Y,YANG S L,KE M,et al.Ranked Fuzzy Keyword Search Based on Simhash over Encrypted Cloud Data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)<br /> 杨旸,杨书略,柯闽,等.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444.<br /> [28]DEY A,JENAMANI M,THAKKAR J J,et al.Lexical TF-IDF:An n-gram Feature Space for Cross-Domain Classification of Sentiment Reviews[C]//International Conference on Pattern Recognition and Machine Intelligence.Springer,Cham,2017:380-386.<br /> [29]WANG B,YU S,LOU W,et al.Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]//33rd IEEE Conference on Computer Communications(INFOCOM).IEEE,2014:2112-2120.<br /> [30]GÖGE C,WAAGE T,HOMANN D,et al.Improving Fuzzy<br /> Searchable Encryption with Direct Bigram Embedding[C]//Trust,Privacy and Security in Digital Business.Cham:Sprin-ger,2017:115-129.<br /> [31]FU Z,WU X,GUAN C,et al.Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J].IEEE Transactions on Information Forensics and Security,2016,11(12):2706-2716.<br /> [32]WANG K X,LI Y X,ZHOU F C,et al.Multi-keyword fuzzy Search over Encrypted Data[J].Journal of Computer Research and Development,2017,54(2):348-360.(in Chinese)<br /> 王恺璇,李宇溪,周福才,等.面向多关键词的模糊密文搜索方法[J].计算机研究与发展,2017,54(2):348-360.<br /> [33]SHI X J,HU S P.Fuzzy Multi-Keyword Query on Encrypted<br /> Data in the Cloud[C]//4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/ Intelligence and Applied Informatics/1st International Conference on Big Data,Cloud Computing,Data Science & Engineering (ACIT-CSII-BCD).IEEE,2016:419-425.<br /> [34]KRISHNA C R,MITTAL S A.Privacy Preserving synonym<br /> based fuzzy multi-keyword ranked search over encrypted cloud data[C]//2016 IEEE International Conference on Computing,Communication and Automation (ICCCA).IEEE,2016:1187-1194.<br /> [35]WANG J,YU X,ZHAO M,et al.Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted DataSuppor-ting Range Query[J].Arabian Journal for Science & Enginee-ring,2015,40(8):2375-2388.<br /> [36]FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.<br /> [37]XIA Z,ZHU Y,SUN X,et al.Secure semantic expansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems & Applications,2014,3(1):1-11.<br /> [38]FU Z J,SUN X M,JI S,et al.Towards efficient content-aware search over encrypted outsourced data in cloud[C]//33rd IEEE Conference on Computer Communications (INFOCOM).IEEE,2016:1-9.<br /> [39]FU Z,HUANG F,REN K,et al.Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884.<br /> [40]SAINI V,CHALLA R K,KHAN N S,et al.An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data[C]//9th International Conference on Advanced Computing and Communication Technologies (ICACCT).2016:433-441.<br /> [41]FU Z,SUN X,XIA Z,et al.Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing[C]//32nd IEEE International Performance,Computing,and Communications Conference (IPCCC).IEEE,2013:1-8.<br /> [42]ZHAO R,LI H,YANG Y,et al.Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking[C]//6th International Conference on Wireless Communications and Signal Processing (WCSP).IEEE,2014:1-6.<br /> [43]FU Z,REN K,SHU J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.<br /> [44]GENNARO R,GENTRY C,PARNO B,et al.Non-Interactive<br /> verifiable computing:outsourcing computation to untrusted workers[C]//30th International Cryptology Conference (CRYPTO).2010:465-482.<br /> [45]SUN W,WANG B,CAO N,et al.Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(11):3025-3035.<br /> [46]WAN Z,DENG R H.VPSearch:Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data[J].IEEE Transactions on Dependable and Secure Computing,2016,PP(99):1-12.
[1] GUANJian, WANG Jing-bin, BIAN Qian-hong. Multi-keyword Streaming Parallel Retrieval Algorithm Based on Urban Security Knowledge Graph [J]. Computer Science, 2019, 46(2): 35-41.
[2] YAO Han-bing, XING Na-na, ZHOU Jun-wei and LI Yong-hua. Study on Secure Retrieval Scheme over Encrypted Data Supporting Result Ranking [J]. Computer Science, 2018, 45(5): 123-130.
[3] HE Heng, XIA Wei, ZHANG Ji, JIN Yu and LI Peng. Fuzzy Multi-keyword Retrieval Scheme over Encrypted Data in Cloud Computing [J]. Computer Science, 2017, 44(5): 146-152.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .