Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data

被引:2
|
作者
Liang, Yanrong [1 ]
Ma, Jianfeng [1 ]
Miao, Yinbin [1 ]
Kuang, Da [1 ]
Meng, Xiangdong [2 ]
Deng, Robert H. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
基金
中国国家自然科学基金;
关键词
Keyword search; Encryption; Cryptography; Servers; Indexes; Security; Privacy; Searchable symmetric encryption; bloom filter-based keyword search; circular shift and coalesce-bloom filter; symmetric-key hidden vector encryption; SECURE;
D O I
10.1109/TC.2023.3285103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve the search over encrypted data in cloud server, Searchable Encryption (SE) has attracted extensive attention from both academic and industrial fields. The existing Bloom filter-based SE schemes can achieve similarity search, but will generally incur high false positive rates, and even leak the privacy of values in Bloom filters (BF). To solve the above problems, we first propose a basic Privacy-preserving Bloom filter-based Keyword Search scheme using the Circular Shift and Coalesce-Bloom Filter (CSC-BF) and Symmetric-key Hidden Vector Encryption (SHVE) technology (namely PBKS), which can achieve effective search while protecting the values in BFs. Then, we design a new index structure T-CSCBF utilizing the Twin Bloom Filter (TBF) technology. Based on this, we propose an improved scheme PBKS+, which assigns a unique inclusion identifier to each position in each BF with privacy protection. Formal security analysis proves that our schemes are secure against Indistinguishability under Selective Chosen-Plaintext Attack (IND-SCPA), and extensive experiments using real-world datasets demonstrate that our schemes are feasible in practice.
引用
收藏
页码:3086 / 3098
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Keyword-based Semantic Search over Encrypted Cloud Data
    Sun, Xingming
    Zhu, Yanling
    Xia, Zhihua
    Chen, Lihong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 9 - 20
  • [2] Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
    Xu, Qunqun
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    [J]. 2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 239 - 245
  • [3] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [4] Privacy Preserving Keyword Search over Encrypted Cloud Data
    Ananthi, S.
    Sendil, M. Sadish
    Karthik, S.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 480 - 487
  • [5] Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 829 - 837
  • [6] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [7] Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
    Singh N.
    Kumar J.
    Singh A.K.
    Mohan A.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 261 - 274
  • [8] Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
    Sreekumari, Prasanthi
    [J]. 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 114 - 120
  • [9] Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data
    Xu, Chang
    Wang, Ruijuan
    Zhu, Liehuang
    Zhang, Chuan
    Lu, Rongxing
    Sharif, Kashif
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 805 - 817
  • [10] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)