Computer Science ›› 2024, Vol. 51 ›› Issue (11): 298-306.doi: 10.11896/jsjkx.231000111

• Information Security • Previous Articles     Next Articles

Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey

LIU Yuanlong1, DAI Hua1,2, LI Zhangchen1, ZHOU Qian3, YI Xun4, YANG Geng1,2   

  1. 1 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    2 Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,Nanjing 210023,China
    3 School of Modern Posts,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    4 School of Computing Technologies,RMIT University,Melbourne 3001,Australia
  • Received:2023-10-18 Revised:2024-02-07 Online:2024-11-15 Published:2024-11-06
  • About author:LIU Yuanlong,born in 2000,postgra-duate.His main research interest is cloud computing security.
    DAI Hua,born in 1982,Ph.D,professor,Ph.D supervisor,is a member of CCF(No.40161M).His main research interests include cloud computing security and privacy protection.
  • Supported by:
    General Program the National Natural Science Foundation of China(62372244,61972209,61872197) and Postgraduate Research & Practice Innovation Program of Jiangsu Province(KYCX22_0984).

Abstract: With the continuous development of cloud computing and big data technology,data owners are increasingly inclined to outsource their data to cloud servers.In order to ensure the security of these data,many privacy-preserving ciphertext retrieval techniques in cloud environments have been proposed.However,thetraditionalprivacy-preserving search schemes usually do not consider the semantic relationship between keywords and documents.To address this problem,in recent years,semantic-aware ciphertext retrieval schemes for cloud environments have become a research hotspot..This paper presents the existing research work on semantic-aware ciphertext retrieval in cloud environments,showcasing the system models,security models,and retrieval frameworks mainly adopted.It categorizes and summarizes existing semantic-aware searchable encryption schemes from the perspective of core technology for semantic expansion,illustrating their advantages and limitations.Finally,it concludes the existing research work and discusses future research directions in this field.

Key words: Cloud computing, Privacy protection, Semantic aware, Keyword retrieval, Searchable encryption

CLC Number: 

  • TP391
[1] SUN P.Security and Privacy Protection in Cloud Computing:Discussions and Challenges[J].Journal of Network and Computer Applications,2020,160:1-22.
[2] LU J,XIAO R,JIN S.A Survey for Cloud Data Security[J].Journal of Electronics & Information Technology,2021,43(4):881-891.
[3] PARAST K,SINDHAY C,NIKAM S,et al.Cloud Computing Security:A Survey of Service-based Models[J].Computers & Security,2022,114:1-14.
[4] ALAHMAD S,KAHTAN H,ALZOUBI I,et al.Mobile Cloud Computing Models Security Issues:A Systematic Review[J].Journal of Network and Computer Applications,2021,190:1-17.
[5] WANG T,LIANG Y,TIAN Y,et al.Solving Coupling Security Problem for Sustainable Sensor-cloud Systems based on Fog Computing[J].IEEE Transactions on Sustainable Computing,2021,6(1):43-53.
[6] MTHUNZI N,BENKHELIFA E,BOSAKOWSKI T,et al.Cloud Computing Security Taxonomy:from an Atomistic to a Holistic View[J].Future Generation Computer Systems,2020,107:620-644.
[7] ERMAKOVA T,FABIAN B,KORNACKA M,et al.Security and Privacy Requirements for Cloud Computing in Healthcare:Elicitation and Prioritization from a Patient Perspective[J].ACM Transactions on Management Information Systems,2020,11(2):1-29.
[8] TIAN H,ZHANG Y,LI C,et al.A Survey of Confidentiality Protection for Cloud Databases[J].Chinese Journal of Compu-ters,2017,40(10):2245-2270.
[9] HASSAN J,SHEHZAD D,HABIB U,et al.The rise of cloudcomputing:data protection,privacy,and open research challenges-a systematic literature review(SLR)[J].Computational Intelligence and Neuroscience,2022,2022:1-26.
[10] CAO N,WANG C,LI M,et al.Privacy-preserving multi-key-word ranked search over encrypted cloud data[J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,25(1):222-233.
[11] SUN P J.Privacy protection and data security in cloud compu-ting:a survey,challenges,and solutions[J].IEEE Access,2019,7:147420-147452.
[12] MELL P.The NIST Definition of Cloud Computing[J].Communications of the ACM,2010,53(6):50-50.
[13] LI J W,JIA C F,LIU Z L.Survey on the Searchable Encryption[J].Journal of Software,2015,26(1):109-128.
[14] DONG X L,ZHOU J,CAO Z F.Research Advances on SecureSearchable Encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120.
[15] FU Z,SUN X,LINGE N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.
[16] WONG W,CHEUNG D,KAO B,et al.Secure kNN computa-tion on encrypted databases[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data.Providence:ACM,2009:139-152.
[17] XIA Z,ZHU Y,SUN X,et al.Secure semanticexpansion based search over encrypted cloud data supporting similarity ranking[J].Journal of Cloud Computing Advances Systems & Applications,2014,3(1):1-11.
[18] SUN X,ZHU Y,XIA Z,et al.Secure keyword-based ranked semantic search over encrypted cloud data[J].Proceedings of the Advanced Science and Technology Letters(MulGraB 2013),2013,31:271-283.
[19] SUN X,ZHU Y,XIA Z,et al.Privacy-preserving keyword-based semantic search over encrypted cloud data[J].International Journal of Security and Its Applications,2014,8(3):9-20.
[20] SAINI V,CHALLA R K,KHAN N S.An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data[C]//Advanced Computing andCommu-nication Technologies:Proceedings of the 9th ICACCT.Singapore:Springer,2016:433-441.
[21] MOATAZ T,SHIKFA A,CUPPENS-BOULAHIA N,et al.Semantic search over encrypted data[C]//International Confe-rence on Telecommunications 2013.Casablanca:IEEE,2013:1-5.
[22] MILLER G A.WordNet:a lexical database for English[J].Communications of the ACM,1995,38(11):39-41.
[23] FU Z,SHU J,SUN X,et al.Smart cloud search services:verifiable keyword-based semantic search over encrypted cloud data[J].IEEE Transactions on Consumer Electronics,2014,60(4):762-770.
[24] GUAN Z,LIU X,WU L,et al.Cross-lingual multi-keywordrank search with semantic extension over encrypted data[J].Information Sciences,2020,514:523-540.
[25] LIU G,YANG G,BAI S,et al.FSSE:An effective fuzzy semantic searchable encryption scheme over encrypted cloud data[J].IEEE Access,2020,8:71893-71906.
[26] YU J,LU P,ZHU Y,et al.Toward securemultikeyword top-kretrieval over encrypted cloud data[J].IEEE Transactions on Dependable and Secure Computing,2013,10(4):239-250.
[27] MIRANDA-JIMENEZ S,GELBUKH A,SIDOROV G.Summarizing conceptual graphs for automatic summarization task[C]//Conceptual Structures for STEM Research and Education:20th International Conference on Conceptual Structures 2013.Mumbai:Springer,2013:245-253.
[28] POH G S,MOHAMAD M S,ZABA M R.Structured encryption for conceptual graphs[C]//International Workshop on Security.Berlin:Springer,2012:105-122.
[29] CHASE M,KAMARA S.Structured encryption and controlled disclosure[C]//Advances in Cryptology-ASIACRYPT 2010:16th International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer,2010:577-594.
[30] FU Z,HUANG F,SUN X,et al.Enabling semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Services Computing,2016,12(5):813-823.
[31] FU Z,HUANG F,REN K,et al.Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1874-1884.
[32] FU Z,SUN X,JI S,et al.Towards efficient content-awaresearch over encrypted outsourced data in cloud[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Confe-rence on Computer Communications.San Francisco:IEEE,2016:1-9.
[33] FU Z,XIA L,SUN X,et al.Semantic-aware searching over encrypted data for cloud computing[J].IEEE Transactions on Information Forensics and Security,2018,13(9):2359-2371.
[34] MIKOLOV T,CHEN K,CORRADO G,et al.Efficient estimation of word representations in vector space[J].arXiv:1301.13781,2013.
[35] LIU Y,FU Z.Secure search service based on word2vec in the public cloud[J].International Journal of Computational Science and Engineering,2019,18(3):305-313.
[36] ZHANG Y,WANG Y,LI Y.Searchable public key encryption supporting semantic multi-keywords search[J].IEEE Access,2019,7:122078-122090.
[37] CHEN L,XUE Y,MU Y,et al.CASE-SSE:Context-Aware Semantically Extensible Search-able Symmetric Encryption for Encrypted Cloud Data[J].IEEE Transactions on Services Computing,2022,16(2):1011-1022.
[38] ZHANG M,CHEN Y,HUANG J.SE-PPFM:A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems[J].IEEE Systems Journal,2020,15(2):2980-2988.
[39] DAI X,DAI H,YANG G,et al.An efficient and dynamic semantic-aware multi keyword ranked search scheme over encrypted cloud data[J].IEEE Access,2019,7:142855-142865.
[40] BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].Journal of Machine Learning Research,2003,3(Jan):993-1022.
[41] DAI H,DAI X,YI X,et al.Semantic-aware Multi-keywordRanked Search Scheme over Encrypted Cloud Data[J].Journal of Network and Computer Applications,2019,147:102442.
[42] DAI X,DAI H,RONG C,et al.Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Cloud Computing,2020,10(4):2595-2612.
[43] ZHOU Q,DAI H,HU Z,et al.Accuracy-first and efficiency-first privacy-preserving semantic-awa-re ranked searches in the cloud[J].International Journal of Intelligent Systems,2022,37(11):9213-9244.
[44] ZHOU Q,DAI H,HU Z,et al.SAPMS:A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud[C]//Asia-Pacific Web(APWeb) and Web-Age Information Management(WAIM) Joint International Conference on Web and Big Data.Nanjing:Springer,2022:251-263.
[45] ZHOU Q,DAI H,LIU Y,et al.A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data[J].World Wide Web,2023,6:3055-3079.
[46] KENTON J D M W C,TOUTANOVA L K.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding[C]//Proceedings of NAACL-HLT.Minneapolis:ACL,2019:4171-4186.
[47] FU Z,WANG Y,SUN X,et al.Semantic and secure search over encrypted outsourcing cloud based on BERT[J].Frontiers of Computer Science,2022,16:1-8.
[48] HU Z,DAI H,LIU Y,et al.CSMRS:An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data[C]//2022 IEEE 25th International Conf-erence on Computer Supported Cooperative Work in Design(CSCWD).Hangzhou:IEEE,2022:699-704.
[49] LANG B,WANG J,LI M,et al.Semantic-based compound keyword search over encrypted cloud data[J].IEEE Transactions on Services Computing,2018,14(3):850-863.
[50] YANG W,ZHU Y.A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud[J].IEEE Transactions on Information Forensics and Security,2020,16:100-115.
[51] ZHAO L,CHEN L.A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable(Outsourced) Computation[C]//Proceedings of the 2018 on Asia Conference on Computer and Commu-nications Security.New York:Association for Computing Machinery,2018:253-260.
[1] LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337.
[2] FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404.
[3] WANG Tian, SHEN Wei, ZHANG Gongxuan, XU Linli, WANG Zhen, YUN Yu. Soft Real-time Cloud Service Request Scheduling and Multiserver System Configuration for ProfitOptimization [J]. Computer Science, 2024, 51(6A): 230900099-10.
[4] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[5] SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6.
[6] TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8.
[7] WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9.
[8] SHAO Tong, LI Chuan, XUE Lei, LIU Yang, ZHAO Ning, CHEN Qing. Forward and Backward Secure Dynamic Searchable Encryption Schemes Based on vORAM [J]. Computer Science, 2024, 51(6A): 230500098-9.
[9] TANG Xin, DI Nongyu, YANG Hao, LIU Xin. Optimum Proposal to secGear Based on Skiplist [J]. Computer Science, 2024, 51(6A): 230700030-5.
[10] HAN Yujie, XU Zhijie, YANG Dingyu, HUANG Bo, GUO Jianmei. CDES:Data-driven Efficiency Evaluation Methodology for Cloud Database [J]. Computer Science, 2024, 51(6): 111-117.
[11] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[12] LIU Daoqing, HU Hongchao, HUO Shumin. N-variant Architecture for Container Runtime Security Threats [J]. Computer Science, 2024, 51(6): 399-408.
[13] WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339.
[14] XU Chengzhi, XU Lei, XU Chungen. Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption [J]. Computer Science, 2024, 51(3): 340-350.
[15] YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!