Abstract
In the past decades, with the development of cloud computing, ranked keyword search, which devotes to find the most relevant results, has been extensively studied in outsourcing domain. However, due to a mass of sensitive information containing in the outsourced data, the issue of privacy has become the main brunt. Existing works primarily resort to searchable encryption to protect the privacy but do not consider the access pattern and search pattern, which can be used to infer the privacy information. Moreover, since the cloud server may be malicious, result integrity also needs to be considered. Therefore, in this paper, we study the problem of secure and authenticated ranked keyword search, called SARKS. Specifically, we first propose a framework that integrates d-differential privacy, erasure coding, and oblivious traverse to achieve access pattern and search pattern protection and meanwhile propose a scheme based on merkle hash tree to realize the correctness and completeness of the query results. To accelerate the performance, we further propose an improved scheme by adopting clustering method. Finally, the formal security analysis is conducted and the empirical evaluation over the real-world dataset has demonstrated the feasibility and practicability of our proposed schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Chen, G., Lai, T., Reiter, M.K., Zhang, Y.: Differentially private access patterns for searchable symmetric encryption, pp. 810–818. IEEE (2018)
Cui, N., Li, J., Yang, X., Wang, B., Reynolds, M., **ang, Y.: When geo-text meets security: privacy-preserving Boolean spatial keyword queries, pp. 1046–1057. IEEE (2019)
Cui, N., Yang, X., Chen, Y., Li, J., Wang, B., Min, G.: Secure Boolean spatial keyword query with lightweight access control in cloud environments. IEEE Internet Things J. 9(12), 9503–9514 (2022)
Dai, H., Yang, M., Yang, T.G., ** inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Sustain. Comput. 7(3), 561–578 (2022)
Ding, X., Liu, P., **, H.: Privacy-preserving multi-keyword top-\$k similarity search over encrypted data. IEEE Trans. Dependable Secur. Comput. 16(2), 344–357 (2019)
Ge, X., et al.: Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans. Dependable Secur. Comput. 18(1), 490–504 (2021)
Li, F., Ma, J., Miao, Y., Jiang, Q., Liu, X., Choo, K.K.R.: Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Trans. Cloud Comput. 1 (2021). https://doi.org/10.1109/TCC.2021.3093304
Li, J., Ma, J., Miao, Y., Yang, R., Liu, X., Choo, K.R.: Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans. Cloud Comput. 10(3), 2005–2019 (2022)
Liu, G., Yang, G., Bai, S., Wang, H., **ang, Y.: FASE: a fast and accurate privacy-preserving multi-keyword top-k retrieval scheme over encrypted cloud data. IEEE Trans. Serv. Comput. 15(4), 1855–1867 (2022)
Liu, Q., Tian, Y., Wu, J., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69–82 (2022)
Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.K.R., Deng, R.: Ranked keyword search over encrypted cloud data through machine learning method. IEEE Trans. Serv. Comput. 1 (2022). https://doi.org/10.1109/TSC.2021.3140098
Wan, Z., Deng, R.H.: VPSearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 15(6), 1083–1095 (2018)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases, pp. 139–152. ACM (2009)
**a, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Zheng, Y., Lu, R., Guan, Y., Shao, J., Zhu, H.: Achieving efficient and privacy-preserving set containment search over encrypted data. IEEE Trans. Serv. Comput. 15(5), 2604–2618 (2022)
Acknowledgement
This work was supported by National Natural Science Foundation of China (62011530-046, U1936220, 62002054), Industry-university-research Innovation Fund for Chinese Universities (2020ITA03009), Ten Thousand Talent Program (ZX20200035), and Excellent Youth Foundation of Anhui Scientific Committee (2108085J31).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cui, N., Deng, Z., Li, M., Ma, Y., Cui, J., Zhong, H. (2023). Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee. In: Wang, X., et al. Database Systems for Advanced Applications. DASFAA 2023. Lecture Notes in Computer Science, vol 13943. Springer, Cham. https://doi.org/10.1007/978-3-031-30637-2_43
Download citation
DOI: https://doi.org/10.1007/978-3-031-30637-2_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30636-5
Online ISBN: 978-3-031-30637-2
eBook Packages: Computer ScienceComputer Science (R0)