Efficient ciphertext search method based on similarity search tree

被引:0
|
作者
Tian X. [1 ]
Zhu X.-J. [1 ]
Shen P.-S. [1 ]
Chen C. [1 ]
Zou H. [2 ]
机构
[1] State Key Laboratory of Information Security, Institute of Information Engineering, The Chinese Academy of Sciences, Beijing
[2] Information Center, Guangdong Power Grid Company Limited, Guangzhou
来源
Chen, Chi (chenchi@iie.ac.cn) | 2016年 / Chinese Academy of Sciences卷 / 27期
关键词
Ciphertext search; Cloud computing; Cloud security; Multi-keyword ranked search; Similarity search tree;
D O I
10.13328/j.cnki.jos.004998
中图分类号
学科分类号
摘要
With extensive applications of cloud computing, data capacity of data centers has grown rapidly. Furthermore, document information, which usually contains user's sensitive information, needs to be encrypted before being outsourced to data centers. Faced with such a large amount of ciphertext data, current techniques have low search efficiency in this scenario. Aiming at solving this problem, this paper proposes an efficient ciphertext search method based on similarity search tree (MRSE-SS) that can handle big data volume. The proposed approach clusters the documents based on the max distance between the cluster center and its members, constructs an n-dimensional hyper sphere by using the cluster center as the center of sphere and the max distance as radius, and then gradually clusters small clusters into large clusters. In the search phase of the ciphertext document collection constructed by this method, the ideal retrieval results can be obtained only by searching the query vector's neighboring clusters, thus improving the efficiency of ciphertext search. An experiment is conducted using the collection set built from the recent ten years' JC publications, containing about 2900 documents with nearly 4800 keywords. The results show that the presented approach can reach a linear computational complexity against exponential size of document collection. In addition, the retrieved documents have a better relationship with each other than by traditional methods. © Copyright 2016, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1566 / 1576
页数:10
相关论文
共 14 条
  • [1] Song D.X., Wagner D., Perrig A., Practical techniques for searches on encrypted data, Proc. of the 2000 IEEE Symp. on Security and Privacy, pp. 44-55, (2000)
  • [2] Goh E.J., Secure Indexes, 216, pp. 1-19, (2004)
  • [3] Wang C., Cao N., Li J., Ren K., Lou W., Secure ranked keyword search over encrypted cloud data, Proc. of the 2010 Int'l Conf. on Distributed Computing Systems, pp. 253-262, (2010)
  • [4] Sun W., Wang B., Cao N., Li M., Lou W., Hou Y.T., Li H., Privacy-Preserving multi-keyword text search in the cloud supporting similarity-based ranking, Proc. of the ASIA 8th ACM Symp. on Information, Computer and Communications Security (CCS 2013), pp. 71-82, (2013)
  • [5] Leslie H., Jain R., Birdsall D., Yaghmai H., Efficient search of multi-dimensional B-trees, Proc. of the 21th Int'l Conf. on Very Large Data Bases (VLDB'95), pp. 710-719, (1995)
  • [6] Ciaccia P., Patella M., Rabitti F., Zezula P., Indexing metric spaces with M-tree, Proc. of the SEBD, pp. 67-86, (1997)
  • [7] Wang C., Cao N., Ren K., Lou W.J., Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Trans. on Parallel and Distributed Systems, 23, 8, pp. 1467-1479, (2012)
  • [8] Yu S., Wang C., Ren K., Lou W., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proc. of the 2010 IEEE INFOCOM, pp. 1-9, (2010)
  • [9] Kaufman L., Rousseeuw P.J., Finding Groups in Data: An Introduction to Cluster Analysis, pp. 108-110, (2005)
  • [10] White D., Jain R., Similarity indexing with the SS-tree, Proc. of the 20th Int'l Conf. on Data Engineering, pp. 516-523, (1996)