Search Over Encrypted Cloud Data With Secure Updates

被引:0
|
作者
Ocansey, Selasi Kwame [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; searchable encryption; update; multi-keyword search; outsourced data; KEYWORD SEARCH;
D O I
10.1109/QRS-C.2019.00077
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Searchable symmetric encryption (SSE) is a key technique which enables searching over outsourced encrypted data. Hence, SSE must provide for the functions of effective, secure privacy and usability when searching over outsourced data on the cloud. In this regard, various research into the secure search on cloud data has been done using SSE and searchable public key encryption. In this framework, we leverage a practicable searchable encryption (SE) scheme which supports secure and updatable operations on the cloud. The framework will take into consideration the advantages of both SSE and searchable public key encryption in the construction. We also construct an efficient multi-keyword search scheme using k-nearest neighbor (kNN) and Bloom Filter (BF) to achieve ranked search scheme as well as multi keyword searching.
引用
收藏
页码:380 / 386
页数:7
相关论文
共 50 条
  • [1] Secure Search over Encrypted Enterprise Data in the Cloud
    Wang, Kaishi
    Guo, Jiaqi
    [J]. International Journal of Network Security, 2023, 25 (01) : 103 - 112
  • [2] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [3] Survey on secure search over encrypted data on the cloud
    Hoang Pham
    Woodworth, Jason
    Salehi, Mohsen Amini
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (17):
  • [4] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [5] Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
    Koo, Dongyoung
    Hur, Junbeom
    Yoon, Hyunsoo
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 229 - 235
  • [6] Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
    Li, Hongwei
    Liu, Dongxiao
    Dai, Yuanshun
    Luan, Tom H.
    Yu, Shui
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2018, 6 (01) : 97 - 109
  • [7] Secure Similarity Search over Encrypted Cloud Images
    Zhu, Yi
    Sun, Xingming
    Xia, Zhihua
    Xiong, Naixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 1 - 14
  • [8] Secure similarity search over encrypted cloud images
    Jiangsu Engineering Center of Network Monitoring, China
    不详
    不详
    [J]. Int. J. Secur. Appl., 8 (1-14):
  • [9] Efficient and Secure Nearest Neighbor Search Over Encrypted Data in Cloud Environment
    Upinder, Kaur
    Pushpa, R. Suri
    [J]. DATA SCIENCE AND ANALYTICS, 2018, 799 : 587 - 598
  • [10] Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
    Jia Zhi-peng
    Zhang Ya-ling
    Wang Shang-ping
    Sun Qin-dong
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 697 - 701