Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Top Cited Papers
- 6 December 2011
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Parallel and Distributed Systems
- Vol. 23 (8), 1467-1479
- https://doi.org/10.1109/tpds.2011.282
Abstract
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very challenging task. Although traditional searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore the statistical measure approach, i.e., relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys “as-strong-as-possible” security guarantee compared to previous searchable encryption schemes, while correctly realizing the goal of ranked keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.Keywords
This publication has 20 references indexed in Scilit:
- Privacy-Preserving Public Auditing for Secure Cloud StorageIEEE Transactions on Computers, 2011
- Private Query on Encrypted Data in Multi-user SettingsPublished by Springer Science and Business Media LLC ,2008
- Deterministic and Efficiently Searchable EncryptionPublished by Springer Science and Business Media LLC ,2007
- Conjunctive, Subset, and Range Queries on Encrypted DataPublished by Springer Science and Business Media LLC ,2007
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Privacy Preserving Keyword Searches on Remote Encrypted DataLecture Notes in Computer Science, 2005
- Achieving Efficient Conjunctive Keyword Searches over Encrypted DataLecture Notes in Computer Science, 2005
- Secure Conjunctive Keyword Search over Encrypted DataLecture Notes in Computer Science, 2004
- Exploring the similarity spaceACM SIGIR Forum, 1998
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996