Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension

被引:0
|
作者
Xu G. [1 ]
Shi C. [1 ]
Wang W. [1 ]
Pan Q. [1 ]
Li F. [1 ]
机构
[1] College of Computer Science and Technology, Donghua University, Shanghai
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2019年 / 56卷 / 10期
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Cloud storage; Condensed hierarchical clustering; Dependency grammar; Searchable encryption; Semantic extension;
D O I
10.7544/issn1000-1239.2019.20190378
中图分类号
学科分类号
摘要
In cloud storage, to protect the data security and privacy of data owners, data encryption is used to provide on-demand data services. Searchable encryption technology is the key method to solve encrypted data access. However, the multi-keywords in search do not distinguish and ignore the correlation between indexes, which will cause long search time and low accuracy. To this end, this paper proposes a multi-keyword searchable encryption algorithm based on semantic extension. Firstly, the dependency syntax is based on to distinguish the importance of multiple keywords for semantic expansion, and generate multiple keyword trapdoors. Secondly, the condensed hierarchical clustering and the keyword balanced binary tree are based on, and the index tree structure of index relevance is constructed. Finally, the pruning parameter and the correlation score threshold are introduced to prune the index tree, and the index-independent subtree is filtered out in the index tree. Theoretical and experimental analysis based on real data sets shows that the proposed algorithm can resist scale analysis attacks and improve search time efficiency and search accuracy. © 2019, Science Press. All right reserved.
引用
收藏
页码:2193 / 2206
页数:13
相关论文
共 33 条
  • [1] Ren K., Wang C., Wang Q., Security challenges for the public cloud, IEEE Internet Computing, 16, 1, pp. 69-73, (2012)
  • [2] Wang Q., Zhang Y., Lu X., Et al., Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy, IEEE Transactions on Dependable and Secure Computing, 15, 4, pp. 591-606, (2016)
  • [3] Du M., Wang Q., He M., Et al., Privacy-preserving indexing and query processing for secure dynamic cloud storage, IEEE Transactions on Information Forensics and Security, 13, 9, pp. 2320-2332, (2018)
  • [4] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proc of the 2000 IEEE Security and Privacy Symp., pp. 44-55, (2000)
  • [5] Li J., Wang Q., Wang C., Et al., Fuzzy keyword search over encrypted data in cloud computing, Proc of the 2010 IEEE INFOCOM, pp. 1-5, (2010)
  • [6] Cao N., Wang C., Li M., Et al., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 25, 1, pp. 222-233, (2013)
  • [7] Wang Q., He M., Du M., Et al., Searchable encryption over feature-rich data, IEEE Transactions on Dependable and Secure Computing, 15, 3, pp. 496-510, (2016)
  • [8] Hu S., Wang Q., Wang J., Et al., Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data, IEEE Transactions on Image Processing, 25, 7, pp. 3411-3425, (2016)
  • [9] Song W., Wang B., Wang Q., Et al., Publicly verifiable computation of polynomials over outsourced data with multiple sources, IEEE Transactions on Information Forensics and Security, 12, 10, pp. 2334-2347, (2017)
  • [10] Xia Z., Wang X., Sun X., Et al., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 27, 2, pp. 340-352, (2015)