A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment

被引:9
|
作者
Wang, Haoyang [1 ]
Fan, Kai [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[2] Xidian Univ, Minist Educ Wide Band Gap Semicon Mat & Devices, Key Lab, Xian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
P2P network; Secure kNN algorithm; Tree-based index; Time-stamp chain; Merkle tree; Forward and backward security; ACCESS-CONTROL; ENCRYPTION; EFFICIENT;
D O I
10.1007/s12083-020-00912-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet, Peer to Peer(P2P) network has been applied in various fields. Users in P2P network also have a large amount of data, but users cannot provide enough storage space locally. More and more users choose to upload their own data to cloud server in order to save overhead and facilitate sharing their own data with other users. In order to ensure data security, researchers have proposed searchable encryption(SE) technology, and searchable encryption has been widely used. In this paper, a dynamic verifiable multi-keyword ranked search scheme is proposed under the background of P2P network and cloud storage service(CSS). On the basis of using secure kNN algorithm to encrypt index and traditional inner product algorithm to obtain ranked results, the scheme in this paper realizes forward and backward security by changing the structure of file vector and using modular residual computation. Meanwhile, the integrity and freshness of search results are verified by combining timestamp chain and Merkle tree. Finally, the security of this scheme under two threat models is analyzed, and the performance evaluation experiment is carried out on the document set.
引用
收藏
页码:2342 / 2355
页数:14
相关论文
共 50 条
  • [41] Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
    Zhou Yousheng
    Huang Miao
    Liu Yuanni
    Chen Zigang
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (02) : 83 - 95
  • [42] Dynamic multi-keyword fuzzy ranked search with leakage resilience over encrypted cloud data
    Zhou Y.
    Huang M.
    Liu Y.
    Chen Z.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (02): : 83 - 95
  • [43] Cryptography Based Dynamic Multi-Keyword Ranked Search Using ECC/B+TRE
    Prasanna, B. T.
    Akki, C. B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 323 - 336
  • [44] Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
    Guo, Cheng
    Zhuang, Ruhan
    Chang, Chin-Chen
    Yuan, Qiongqiong
    IEEE ACCESS, 2019, 7 : 35826 - 35837
  • [45] An improved multi-keyword ranked search over encrypted cloud data
    Xia, Taijun
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 177 - 182
  • [46] Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data
    Sun, Xingming
    Wang, Xinhui
    Xia, Zhihua
    Fu, Zhangjie
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 319 - 332
  • [47] Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index
    Du R.
    Li M.
    Tian J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (03): : 555 - 565
  • [48] Verifiable Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
    Wei, Xue
    Zhang, Hua
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 271 - 277
  • [49] Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data
    Mashauri, Daudi
    Li, Ruixuan
    Han, Hongmu
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-zhong
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS, AND WORKSHARING, COLLABORATECOM 2015, 2016, 163 : 3 - 13
  • [50] An Efficient Semantic Search Scheme for Decentralized P2P Environment
    Chen, Jianyong
    Zeng, Huawang
    Wang, Yang
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 491 - 494