Query-Biased Preview over Outsourced and Encrypted Data

被引:2
|
作者
Peng, Ningduo [1 ]
Luo, Guangchun [1 ]
Qin, Ke [1 ]
Chen, Aiguo [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
关键词
FULLY HOMOMORPHIC ENCRYPTION; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE;
D O I
10.1155/2013/860621
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and.. is the snippet length.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data
    Wang, Ling
    Ji, Shan
    Wang, Zhaokang
    Wang, Xiaowan
    Mohiuddin, Ghulam
    Ren, Yongjun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (01): : 221 - 234
  • [22] On query result integrity over encrypted data
    Esiner, Ertem
    Datta, Anwitaman
    INFORMATION PROCESSING LETTERS, 2017, 122 : 34 - 39
  • [23] A Method of Query over Encrypted Data in Database
    Liu, Lianzhong
    Gai, Jingfen
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 23 - 27
  • [24] Private Conjunctive Query over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 149 - 164
  • [25] Distributed Query Evaluation over Encrypted Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Livraga, Giovanni
    Paraboschi, Stefano
    Samarati, Pierangela
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 96 - 114
  • [26] PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data
    Zhang, Qiang
    Liu, Qin
    Wang, Guojun
    IEEE ACCESS, 2018, 6 : 31541 - 31552
  • [27] Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
    Liu, Yuling
    Peng, Hua
    Wang, Jie
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01): : 37 - 57
  • [28] Query-Biased Self-Attentive Network for Query-Focused Video Summarization
    Xiao, Shuwen
    Zhao, Zhou
    Zhang, Zijian
    Guan, Ziyu
    Cai, Deng
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 : 5889 - 5899
  • [29] Fast query over encrypted character data in database
    Wang, ZF
    Dai, J
    Wang, W
    Shi, BL
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1027 - 1033
  • [30] A novel approach for query over encrypted data in database
    Al-Saraireh J.
    International Journal of Information and Computer Security, 2019, 11 (06) : 621 - 636