A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems

被引:0
|
作者
Fu, Junsong [1 ,2 ]
Wang, Na [3 ]
Cui, Baojiang [1 ,2 ]
Bhargava, Bharat K. [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Technol, Beijing 100876, Peoples R China
[3] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[4] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Cloud computing; Servers; Indexes; Security; Encryption; Search problems; Simulation; privacy-preserving; searchable encryption; document ranked retrieval; PUBLIC-KEY ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; PRIVACY; EXTENSION; SUBSET;
D O I
10.1109/TPDS.2021.3107752
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of cloud computing, more and more data owners are motivated to outsource their documents to the cloud and share them with the authorized data users securely and flexibly. To protect data privacy, the documents are generally encrypted before being outsourced to the cloud and hence their searchability decreases. Though many privacy-preserving document search schemes have been proposed, they cannot reach a proper balance among functionality, flexibility, security and efficiency. In this paper, a new encrypted document retrieval system is designed and a proxy server is integrated into the system to alleviate data owner's workload and improve the whole system's security level. In this process, we consider a more practical and stronger threat model in which the cloud server can collude with a small number of data users. To support multiple document search patterns, we construct two AVL trees for the filenames and authors, and a Hierarchical Retrieval Features tree (HRF tree) for the document vectors. A depth-first search algorithm is designed for the HRF tree and the Enhanced Asymmetric Scalar-Product-Preserving Encryption (Enhanced ASPE) algorithm is utilized to encrypt the HRF tree. All the three index trees are linked with each other to efficiently support the search requests with multiple parameters. Theoretical analysis and simulation results illustrate the security and efficiency of the proposed framework.
引用
收藏
页码:1246 / 1261
页数:16
相关论文
共 50 条
  • [1] Comment on Secure File Storage and Retrieval in Cloud
    Chen, Sonia C-, I
    Liu, Chenglian
    [J]. INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2019, 2020, 2293
  • [2] Secure and Efficient Image Retrieval over Encrypted Cloud Data
    Liang, Haihua
    Zhang, Xinpeng
    Cheng, Hang
    Wei, Qiuhan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
    Al Sibahee, Mustafa A.
    Abdulsada, Ayad I.
    Abduljabbar, Zaid Ameen
    Ma, Junchao
    Nyangaresi, Vincent Omollo
    Umran, Samir M.
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [4] A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
    Messmer, Sebastian
    Rill, Jochen
    Achenbach, Dirk
    Mueller-Quade, Joern
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 409 - 429
  • [5] Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems
    Wang, Na
    Zhang, Shancheng
    Zhang, Zheng
    Fu, Junsong
    Liu, Jianwei
    Wang, Ruijin
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 732 - 743
  • [6] Document clustering for efficient and secure information retrieval from cloud
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (15):
  • [7] Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing
    Pitchai, R.
    Jayashri, S.
    Raja, J.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 947 - 960
  • [8] Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing
    R. Pitchai
    S. Jayashri
    J. Raja
    [J]. Wireless Personal Communications, 2016, 90 : 947 - 960
  • [9] Practical Secure Naive Bayesian Classification Over Encrypted Big Data in Cloud
    Zhu, Youwen
    Li, Xingxin
    Wang, Jian
    Liu, Yining
    Qu, Zhiguo
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 683 - 703
  • [10] Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System
    Khashan, Osama Ahmed
    [J]. IEEE ACCESS, 2020, 8 : 210855 - 210867