Verifiable top-k searchable encryption for cloud data

被引:3
|
作者
Elizabeth, B. Lydia [1 ]
Prakash, A. John [2 ]
机构
[1] Anna Univ, Dept Informat Technol, Chennai, Tamil Nadu, India
[2] Anna Univ, Ramanujan Comp Ctr, Chennai, Tamil Nadu, India
关键词
Secure cloud storage; searchable encryption; dynamic search; verifiable search; top-k search; KEYWORD RANKED SEARCH; OUTSOURCED DATABASE; SECURE; EFFICIENT;
D O I
10.1007/s12046-019-1227-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the proliferation of data and the appealing features of cloud computing, the data owners are motivated to outsource their data to the public cloud. Privacy and security, especially for sensitive data, are still a concern, as the data owners have no physical control over the outsourced data. To ensure confidentiality, sensitive data is encrypted before outsourcing to the cloud, which obsoletes the data utilization using traditional keyword-based search. To address this issue, a verifiable top-k searchable encryption for cloud data (VSED) is proposed with provisions for dynamic update operations like addition and deletion of documents. Specifically, an encrypted inverted index is constructed using a secret orthogonal vector and partial homomorphic encryption. To support the ranked search, the widely used term frequency and inverse document frequency rule is used to find the top-k documents. To verify the query results returned by the cloud server, this scheme provides a verifiable search using keyed hashes. Security analysis demonstrates that the proposed scheme is semantically secure, with correctness and privacy guarantees proved in the standard security simulation model. Simulations performed on real-world dataset demonstrate that the proposed scheme is efficient and practical.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Verifiable top-k searchable encryption for cloud data
    B Lydia Elizabeth
    A John Prakash
    [J]. Sādhanā, 2020, 45
  • [2] Top-k Boolean Searchable Encryption Scheme Based on Multiple Keywords
    Guo S.
    He S.
    Su L.
    Zhang X.
    Zhou F.
    Zhang X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1841 - 1852
  • [3] Verifiable semantic fuzzy searchable encryption scheme in cloud computing
    Lin, Bogang
    Wu, Yang
    Yang, Yang
    Zhong, Ling
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 1 - 6
  • [4] Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse
    Fugkeaw, Somchart
    Hak, Lyhour
    Theeramunkong, Thanaruk
    [J]. IEEE ACCESS, 2024, 12 : 49848 - 49864
  • [5] A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
    Dai, Hua
    Yang, Geng
    Zhu, Xiangyang
    Yi, Xun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 111 - 116
  • [6] Verifiable dynamic searchable encryption
    Etemad, Mohammad
    Kupcu, Alptekin
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2606 - 2623
  • [7] Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud
    Liu, Chang
    Zhu, Liehuang
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2017, 2 (04): : 371 - 381
  • [8] Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
    Zhang, Yinghui
    Zhu, Tian
    Guo, Rui
    Xu, Shengmin
    Cui, Hui
    Cao, Jin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 971 - 983
  • [9] Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing
    Su, Yaping
    Wang, Jianfeng
    Wang, Yunling
    Miao, Meixia
    [J]. IEEE ACCESS, 2019, 7 : 141352 - 141362
  • [10] Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
    Gan, Qingqing
    Liu, Joseph K.
    Wang, Xiaoming
    Yuan, Xingliang
    Sun, Shi-Feng
    Huang, Daxin
    Zuo, Cong
    Wang, Jianfeng
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (06)