- 19
- 0
- 约5.47千字
- 约 19页
- 2016-08-01 发布于湖北
- 举报
支持细粒度访问的多关键字搜索Enabling Fine-grained Multi-keyword Search
Enabling Fine-grained Multi-keyword SearchSupporting Classified Sub-dictionaries overEncrypted Cloud Data326 PERFORMANCE EVALUATION RELATED WORKS NETWORK MODEL514 PROPOSED SCHEMESSECURITY ANALYSIS BACKGROUNDOUTLINEBACKGROUND (Data outsourcing)2014 celebrity photo hackData OwnerCloud ServerData UserBACKGROUND (Searchable Encryption)Data OwnerCloud ServerSearch UserRELATED WORKS[6][13][14]Multi-keyword search√√√Coordinate matching√√√Relevance score√√Preference factorAND OR NO operationsa searchable encryption scheme with “OR” operation of keywordsthe frequency that the keyword appears in the documentthe importance of keywords in the search keyword set[6] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.[13] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” IEEE Transactions on Parallel and Distributed Systems, vol. DOI: 10.1109/TPDS.2013.282, 2013.[14] J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, “Towards secure multikeyword top-k retrieval over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239–250, 2013.ContributionsIntroduce the relevance scores and the preference factors of keywords for searchable encryptionRealize the “AND”, “OR” and “NO” operations in the multi-keyword search for searchable encryptionEmploy the classified sub-dictionaries technique to enhance the efficiency of the above two schemesNetwork ModelPROPOSED SCHEMES(Basic scheme)PROPOSED SCHEMES( Scheme_I )PROPOSED SCHEMES(Scheme_II)Extension (Classified sub-dictionaries)Classified sub-dictionaries SECURITY ANALYSISConfidentiality of documentsPrivacy protection of index and trapdoorUnlinkability of trapdoor.SECURITY ANALYSISComparison of Security Level[10] C. Wang, N. Cao, J. Li, K. Re
原创力文档

文档评论(0)