Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data

A Ibrahim, H Jin, AA Yassin… - 2012 IEEE Asia-Pacific …, 2012 - ieeexplore.ieee.org
A Ibrahim, H Jin, AA Yassin, D Zou
2012 IEEE Asia-Pacific Services Computing Conference, 2012ieeexplore.ieee.org
Advances in cloud computing and Internet technologies have pushed more and more data
owners to outsource their data to remote cloud servers to enjoy with huge data management
services in an efficient cost. However, despite its technical advances, cloud computing
introduces many new security challenges that need to be addressed well. This is because,
data owners, under such new setting, loss the control over their sensitive data. To keep the
confidentiality of their sensitive data, data owners usually outsource the encrypted format of …
Advances in cloud computing and Internet technologies have pushed more and more data owners to outsource their data to remote cloud servers to enjoy with huge data management services in an efficient cost. However, despite its technical advances, cloud computing introduces many new security challenges that need to be addressed well. This is because, data owners, under such new setting, loss the control over their sensitive data. To keep the confidentiality of their sensitive data, data owners usually outsource the encrypted format of their data to the untrusted cloud servers. Several approaches have been provided to enable searching the encrypted data. However, the majority of these approaches are limited to handle either a single keyword search or a Boolean search but not a multikeyword ranked search, a more efficient model to retrieve the top documents corresponding to the provided keywords. In this paper, we propose a secure multi-keyword ranked search scheme over the encrypted cloud data. Such scheme allows an authorized user to retrieve the most relevant documents in a descending order, while preserving the privacy of his search request and the contents of documents he retrieved. To do so, data owner builds his searchable index, and associates with each term document with a relevance score, which facilitates document ranking. The proposed scheme uses two distinct cloud servers, one for storing the secure index, while the other is used to store the encrypted document collection. Such new setting prevents leaking the search result, i.e. the document identifiers, to the adversary cloud servers. We have conducted several empirical analyses on a real dataset to demonstrate the performance of our proposed scheme.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果