Computer Science ›› 2013, Vol. 40 ›› Issue (11): 131-136.

Previous Articles     Next Articles

Multi-attribute Ranked Keyword Search over Encrypted Cloud Data

FENG Gui-lan and TAN Liang   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Searching on encrypted data is an important auxiliary function for cloud.Confidentiality-preserving rank-ordered search algorithm computes document relevance scores with one keyword local attribute,so its precision is low.To solve this problem,a multi-attribute ranked keyword search over encrypted cloud data was introduced.Firstly,cloud service provider(CSP)builds secure index of multi-attribute feature vector based on keyword local and global attributes.Secondly,the local attribute and global attribute weights are determined by users’ sort-by.And then,relevance score is calculated by multi-attribute ranking formula.Finally,CSP will return the interested results for the user.Experiments show that the method can improve the retrieval speed and the accuracy of search results effectively.

Key words: Data encryption,Search on encrypted data,Cloud computing,Multi-attribute ranked

[1] 张建勋,古志民,郑超.云计算研究进展综述[J].计算机应用研究,2010,27(2):429-433
[2] Amazon Elastic Compute Cloud(EC2).http://www.amazon.com/ec2/,2008-07-18
[3] Google App Engine.http://appengine.google.com [18 Jul 2008]
[4] Microsoft Live Mesh.http://www.mesh.com,2008-07-18
[5] Kamara S,Lauter K.Cryptographic cloud storage[C]∥Procee-dings of Financial Cryptography:Workshop on Real-Life CryptographicProtocols and Standardization 2010.January 2010
[6] Huang R W,Gui X L,Yu S,et al.Study of privacy preservingframework for cloud storage[J].Computer Scienceand Information Systems,2011,8(3):801-819
[7] Song D,Wagner D,Perrig A.Practical techniques for searcheson encrypted data[C]∥Proc.of IEEE Symposium on Security andPrivacy’00.2000
[8] Boneh D,Crescenzo G D,Ostrovsky R,et al.Public keyencryption with keyword search[C]∥Proc.of EUROCRYP’04,vo-lume3027 of LNCS.Springer,2004
[9] Gentry C.Fully homomorphic encryption using ideal lattices[C]∥Proceedings of the 41st ACM Symposiumon Theory of Computing(STOC''09).Bethesda,Maryland,USA,2009:169-178
[10] Gentry C.Computing arbitrary functions of encrypted data[J].Communications of the ACM,2010,53(3):97
[11] Swaminathan A,Mao Y,Su G-M,et al.Confidentiality-preserving rank-ordered search[C]∥Proc.of the Workshop on Storage Security and Survivability.2007
[12] Boldyreva A,Chenette N,Lee Y,et al.Order-preservingsymme-tric encryption[C]∥Proceedings of Eurocrypt’09,volume 5479of LNCS.Springer,2009
[13] Wang C,Cao N,Li J,et al.Secure ranked keywordsearch over encrypted cloud data[C]∥Proc.of ICDCS’10.2010
[14] Salton G,Wong A,Yang C S.A Vector Space Model for Automatic Indexing[J].Communications of the ACM,1975,18:613-620
[15] Zobel J,Moffat A.Inverted files for text search engines [J].ACM Computing Surverys,2006,38(2):16-31
[16] Rieardo B Y,Berthier R N.ModernInformationRetrieval[M].NewYork:ACM Press,1999,192:5-10
[17] Salton G,Clement T Y.On The Construction of Effective Vocabularies for Information Retrival[C]∥Proceeding of The 1973Meeting on Programming Languages and Information Retrieval.New York,ACM,1973:11

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!