Privacy-preserving multi-keyword ranked search over encrypted cloud data
Top Cited Papers
- 1 April 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2011 Proceedings IEEE INFOCOM
Abstract
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE). We establish a set of strict privacy requirements for such a secure cloud data utilization system. Among various multi-keyword semantics, we choose the efficient similarity measure of “coordinate matching”, i.e., as many matches as possible, to capture the relevance of data documents to the search query. We further use “inner product similarity” to quantitatively evaluate such similarity measure. We first propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world dataset further show proposed schemes indeed introduce low overhead on computation and communication.Keywords
This publication has 15 references indexed in Scilit:
- Fuzzy Keyword Search over Encrypted Data in Cloud ComputingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Secure kNN computation on encrypted databasesPublished by Association for Computing Machinery (ACM) ,2009
- A break in the cloudsACM SIGCOMM Computer Communication Review, 2008
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner ProductsPublished by Springer Science and Business Media LLC ,2008
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsJournal of Cryptology, 2007
- Deterministic and Efficiently Searchable EncryptionPublished by Springer Science and Business Media LLC ,2007
- Conjunctive, Subset, and Range Queries on Encrypted DataPublished by Springer Science and Business Media LLC ,2007
- Public Key Encryption That Allows PIR QueriesLecture Notes in Computer Science, 2007
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Cryptography from AnonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006