Preserving Privacy of Co-occurring Keywords over Encrypted Data

被引:0
|
作者
Kumar, D. V. N. Siva [1 ]
Thilagam, P. Santhi [2 ]
机构
[1] BITS Pilani, Dept CS&IS, Hyderabad Campus, Hyderabad, India
[2] Natl Inst Technol Karnataka, Dept CSE, Mangalore, India
关键词
OPE; Frequency leakage; Index keywords' confidentiality; SECURE;
D O I
10.1007/978-3-030-81242-3_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The indexes of ranked searchable encryption contain encrypted keywords and their encrypted relevance scores. The encryption scheme of relevance scores must preserve the plaintext order after encryption so as to enable the cloud server to determine ranks of the documents directly from the encrypted keywords' scores for a given trap-door. Existing schemes such as Order Preserving Encryption (OPE) and One-to-Many OPE preserve the plaintext order. However, they leak the distribution information, i.e., the frequency of ciphertext values, due to the insufficient randomness employed in these schemes. The cloud server uses frequency analysis attack to infer plaintext keywords of the indexes based on the frequency leakage. In this paper, an Enhanced One-to-Many OPE scheme is proposed to minimize the frequency leakage. The proposed scheme reduces not only the frequency leakage of individual keywords but also the co-occurring keywords of the phrases like "computer network", and "communication network".
引用
收藏
页码:157 / 168
页数:12
相关论文
共 50 条
  • [21] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [22] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [23] A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data
    Jiang, Xiuxiu
    Yu, Jia
    Kong, Fanyu
    Cheng, Xiangguo
    Hao, Rong
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 836 - 839
  • [24] Privacy Preserving Query over Encrypted Multidimensional Massive Data in Cloud Storage
    XIANG Guangli
    LIN Xiang
    WANG Hao
    LI Beilei
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 163 - 170
  • [25] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [26] CryptoImg: Privacy Preserving Processing Over Encrypted Images
    Ibn Ziad, M. Tarek
    Alanwar, Amr
    Alzantot, Moustafa
    Srivastava, Mani
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 570 - 575
  • [27] CryptoEyes: Privacy Preserving Classification over Encrypted Images
    He, Wenbo
    Li, Shusheng
    Wang, Wenbo
    Wei, Muheng
    Qiu, Bohua
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [28] Statistics of co-occurring keywords in confined text messages on Twitter
    J. Mathiesen
    L. Angheluta
    M. H. Jensen
    The European Physical Journal Special Topics, 2014, 223 : 1849 - 1858
  • [29] Statistics of co-occurring keywords in confined text messages on Twitter
    Mathiesen, J.
    Angheluta, L.
    Jensen, M. H.
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (09): : 1849 - 1858
  • [30] Attribute based Range Search over Encrypted Data for Privacy Preserving in Cloud Computing
    Maseedu, Jeswanth
    Pasupuleti, Syam Kumar
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 323 - 329