Query-Biased Preview over Outsourced and Encrypted Data

被引:2
|
作者
Peng, Ningduo [1 ]
Luo, Guangchun [1 ]
Qin, Ke [1 ]
Chen, Aiguo [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
关键词
FULLY HOMOMORPHIC ENCRYPTION; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; SECURE;
D O I
10.1155/2013/860621
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and.. is the snippet length.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data
    Yang, Xu
    Wang, Qiuhao
    Qi, Saiyu
    Li, Ke
    Wang, Jianfeng
    Zhao, Wenjia
    Qi, Yong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6356 - 6371
  • [42] Encrypted SVM for Outsourced Data Mining
    Liu, Fang
    Ng, Wee Keong
    Zhang, Wei
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 1085 - 1092
  • [43] Efficient Private Conjunctive Query Protocol Over Encrypted Data
    Saha, Tushar Kanti
    Koshiba, Takeshi
    CRYPTOGRAPHY, 2021, 5 (01) : 1 - 28
  • [44] Improvement on a privacy-preserving outsourced classification protocol over encrypted data
    Yanting Chai
    Yu Zhan
    Baocang Wang
    Yuan Ping
    Zhili Zhang
    Wireless Networks, 2020, 26 : 4363 - 4374
  • [45] Outsourced privacy -preserving decision tree classification service over encrypted data
    Wang, Chen
    Wang, Andi
    Xu, Jian
    Wang, Qiang
    Zhou, Fucai
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [46] Resolving privacy-preserving relationships over outsourced encrypted data storages
    Huertas Celdran, Alberto
    Dolera Tormo, Gines
    Marmol, Felix Gomez
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (02) : 195 - 209
  • [47] Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Sun, Xingming
    Vasilakos, Athanasios V.
    Yang, Ching-Nung
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 813 - 823
  • [48] A k-NN Query Method Over Encrypted Data
    Zhang, Zhiqiang
    Xin, Lijie
    Xie, Xiaoqin
    Pan, Haiwei
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 164 - 171
  • [49] Multi-dimensional range query over encrypted data
    Shi, Elaine
    Bethencourt, John
    Chan, T-H. Hubert
    Song, Dawn
    Perrig, Adrian
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 350 - +
  • [50] ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data
    Liu, Xueyan
    Guan, Zhitao
    Du, Xiaojiang
    Zhu, Liehuang
    Yu, Zhengtao
    Ma, Yinglong
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 547 - 551