An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking

Springer Science and Business Media LLC - Tập 32 Số 1 - Trang 119-160 - 2014
Cengiz Örencik1, Erkay Savaş2
1Sabancı University, Istanbul, Turkey#TAB#
2Sabanci University, Istanbul, Turkey

Tóm tắt

Từ khóa


Tài liệu tham khảo

Örencik, C., Savaş, E.: Efficient and secure ranked multi-keyword search on encrypted cloud data. In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, pp. 186–195. ACM, New York (2012)

Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45, 965–981 (1998)

Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public key encryption that allows PIR queries. In: Advances in Cryptology (CRYPTO 2007). Lecture Notes in Computer Science, vol. 4622, pp. 50–67. Springer, Berlin (2007)

Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Information, Security and Cryptology (ICISC 2009), pp. 193–210. Springer, Berlin (2009)

Groth, J., Kiayias, A., Lipmaa, H.: Multi-query computationally-private information retrieval with constant communication rate. In: PKC, pp. 107–123 (2010)

Trostle, J.T., Parrish, A.: Efficient computationally private information retrieval from anonymity or trapdoor groups. In: ISC ’10, pp. 114–128 (2010)

Cloud computing innovation key initiative overview (2012). http://my.gartner.com

Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. Comput. Commun. Rev. 39, 50–55 (2008)

Google cloud platform (2012). http://cloud.google.com/

Amazon elastic compute cloud (Amazon ec2) (2012). http://aws.amazon.com/ec2/

Windows live mesh (2012). http://windows.microsoft.com/en-US/windows-live/essentials-other-programs?T1=t4

Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442–455. Springer, Berlin (2005)

Liu, Q., Wang, G., Wu, J.: An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, Vol. 02 (CSE ’09), Washington, DC, USA, pp. 715–720. IEEE Comput. Soc., Los Alamitos (2009)

Ogata, W., Kurosawa, K.: Oblivious keyword search. J. Complex. 20, 356–371 (2004)

Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Theory of Cryptography Conference (TCC 2005), pp. 303–324 (2005)

Boneh, D., Franklin, M.K.: Identity based encryption from the Weil pairing. In: IACR Cryptology ePrint Archive, vol. 2001, p. 90 (2001)

Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS’10, pp. 253–262 (2010)

Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: Proceedings of the 2012 IEEE 28th International Conference on Data Engineering (ICDE ’12), Washington, DC, USA, pp. 1156–1167. IEEE Comput. Soc., Los Alamitos (2012)

Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)

Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262–267 (2011)

Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Information Security Applications. Lecture Notes in Computer Science, pp. 145–159. Springer, Berlin (2009)

Lewis, D.D., Yang, Y., Rose, T.G., Li, F.: Rcv1: a new benchmark collection for text categorization research. J. Mach. Learn. Res. 5, 361–397 (2004)

Oxford dictionaries, the OEC: facts about the language (2011). http://oxforddictionaries.com/page/oecfactslanguage/the-oec-facts-about-the-language

Dickson, L.E.: Linear Groups with an Exposition of Galois Field Theory. Dover, New York (2003)

Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data (SIGMOD ’02), pp. 216–227. ACM, New York (2002)

Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases (VLDB ’04), vol. 30, pp. 720–731. VLDB Endowment, ??? (2004)

Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21, 333–358 (2012)

Pinkas, B., Reinman, T.: Oblivious ram revisited. In: Proceedings of the 30th Annual Conference on Advances in Cryptology (CRYPTO ’10), pp. 502–519. Springer, Berlin (2010)

Google trends (2012). http://www.google.com/trends/

Manning, H.S.C.D., Raghavan, P.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)

Zobel, J., Moffat, A.: Exploring the similarity space. In: SIGIR FORUM, vol. 32, pp. 18–34 (1998)