Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 1923476, 17 pages
https://doi.org/10.1155/2017/1923476
Research Article

MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data

1College of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 200013, China
2Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing 210013, China
3School of Computer Science and IT, RMIT University, Melbourne, VIC 3001, Australia

Correspondence should be addressed to Dai Hua; nc.ude.tpujn@auhiad

Received 9 February 2017; Accepted 22 May 2017; Published 11 July 2017

Academic Editor: Xiangyang Luo

Copyright © 2017 Zhu Xiangyang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authentication protocols for next-generation mobile and CE cloud services,” in Proceedings of the IEEE International Conference on Consumer Electronics, pp. 83–87, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proceedings of the International Conference on Financial Cryptography and Data Security, pp. 136–149.
  3. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proceedings of the IEEE INFOCOM, pp. 829–837, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. W. Sun, B. Wang, N. Cao et al., “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the the 8th ACM SIGSAC symposium, pp. 71–82, Hangzhou, China, 2013. View at Publisher · View at Google Scholar
  5. R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. Xu, “Efficient multi-keyword ranked query over encrypted data in cloud computing,” Future Generation Computer Systems, vol. 30, no. 1, pp. 179–190, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Orencik, A. Selcuk, E. Savas, and M. Kantarcioglu, “Multi-Keyword search over encrypted data with scoring and search pattern obfuscation,” International Journal of Information Security, vol. 15, no. 3, pp. 251–269, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. Z. Xia, X. Wang, X. Sun, Q. Liu, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, 2015. View at Publisher · View at Google Scholar
  8. C. Chen, X. Zhu, P. Shen et al., “An Efficient Privacy-Preserving Ranked Keyword Search Method,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 951–963, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Gentry, A fully homomorphic encryption scheme [Ph.D dissertation], Stanford University, Calif, USA, 2009. View at MathSciNet
  10. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522, Springer Berlin Heidelberg, Berlin, Germany, 2004. View at Google Scholar
  11. D. Cash, S. Jarecki, C. Jutla et al., “Highly-scalable searchable symmetric encryption with support for Boolean queries,” in Advances in Cryptology, pp. 353–373, Springer Berlin Heidelberg, Berlin, Germany, 2013. View at Google Scholar
  12. S. Kamara, C. Papamanthou, and T. Roeder, “Dynamic searchable symmetric encryption,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 965–976, usa, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases,” in Proceedings of the International Conference on Management of Data and 28th Symposium on Principles of Database Systems (SIGMOD-PODS '09), pp. 139–152, Providence, RI, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive 2003/216, 2003. View at Google Scholar
  15. H. Li, H. Ren, H. Yao, H. Chen, G. Xu, and Y. Dai, “Diverse multi-keyword ranked search over encrypted cloud data supporting range query,” in Proceedings of the IEEE/CIC International Conference on Communications in China, ICCC 2015, China, November 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. Z. Fu, X. Sun, Z. Xia, L. Zhou, and J. Shu, “Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing,” in Proceedings of the 2013 IEEE 32nd International Performance Computing and Communications Conference, IPCCC 2013, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query,” IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 164–172, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2015. View at Publisher · View at Google Scholar
  19. M. Alewiwi, C. Orencik, and E. Savaş, “Efficient top-k similarity document search utilizing distributed file systems and cosine similarity,” Cluster Computing, vol. 19, no. 1, pp. 109–126, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Strizhov and I. Ray, “Multi-keyword similarity search over encrypted cloud data,” IACR Cryptology ePrint Archive, vol. 137, 2015. View at Google Scholar
  21. H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312–325, 2016. View at Publisher · View at Google Scholar
  22. C. Orencik, M. Kantarcioglu, and E. Savas, “A practical and secure multi-keyword search method over encrypted cloud data,” in Proceedings of the 2013 IEEE 6th International Conference on Cloud Computing, CLOUD 2013, pp. 390–397, Santa Clara, Calif, USA, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Mashauri, R. Li, H. Han, X. Gu, Z. Xu, and C.-Z. Xu, “Adaptive multi-keyword ranked search over encrypted cloud data,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 163, pp. 3–13, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. M. Strizhov and I. Ray, “Secure multi-keyword similarity search over encrypted cloud data supporting efficient multi-user setup,” Transactions on Data Privacy, vol. 9, no. 2, pp. 131–159, 2016. View at Google Scholar · View at Scopus
  25. D. Thiyagaraja and R. Ganesan, “Cryptographically imposed model for efficient multiple keyword-based search over encrypted data in cloud by secure index using bloom filter and false random bit generator,” I. J. Network Security, vol. 19, no. 3, pp. 413–420, 2017. View at Google Scholar
  26. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proceedings of the IEEE Symposium on Security and Privacy (S&P '00), pp. 44–55, IEEE, Berkeley, Calif, USA, May 2000. View at Publisher · View at Google Scholar · View at Scopus
  27. Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches on remote encrypted data,” in Proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, pp. 442–455, usa, June 2005. View at Scopus
  28. D. Boneh, D. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004.
  29. Z.-Y. Shao and B. Yang, “On security against the server in designated tester public key encryption with keyword search,” Information Processing Letters, vol. 115, no. 12, pp. 957–961, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling secure and efficient ranked keyword search over outsourced cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467–1479, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. B. Zhang and F. Zhang, “An efficient public key encryption with conjunctive-subset keywords search,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 262–267, 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. Z. Chen, C. Wu, D. Wang et al., “Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor,” PAISI, pp. 176–189, 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M.-C. Roşu, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for Boolean queries,” in Advances in Cryptology – CRYPTO 2013, R. Canetti and J. A. Garay, Eds., vol. 8042 of Lecture Notes in Computer Science, pp. 353–373, Springer, Berlin, Heidelberg, 2013. View at Publisher · View at Google Scholar
  34. H. Pang, J. Shen, and R. Krishnan, “Privacy-preserving similarity-based text retrieval,” ACM Transactions on Internet Technology, vol. 10, no. 1, article 4, 2010. View at Publisher · View at Google Scholar · View at Scopus
  35. W. Sun, B. Wang, N. Cao et al., “Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 3025–3035, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. Z. Wan and R. H. Deng, “VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, 1 page. View at Publisher · View at Google Scholar
  37. V. R. Pallipamu, K. Thammi Reddy, and P. Suresh Varma, “ASH-160: A novel algorithm for secure hashing using geometric concepts,” Journal of Information Security and Applications, vol. 21, pp. 52–63, 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. M. Lichman, UCI Machine Learning Repository, University of California, School of Information and Computer Science, Irvine, Calif, USA, 2013, http://archive.ics.uci.edu/ml.