Skip to main content

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

With the progress of science and technology, cloud computing has attracted more and more attention. Individuals or companies use cloud computing to save money. The privacy problem has always been a stumbling block for the further development of cloud computing. A key problem is how to provide an efficient cloud service in a privacy-preserving way while preserving good user experience. In order to solve these problems, scientists have proposed several solutions. However these techniques either generate huge computation costs and bandwidth, or reduce the user experience. In this paper, we propose a Privacy-Preserving Hybrid Cooperative Searching (HCPS) scheme. Our scheme allows multiple users to combine their queries in order to reduce the query cost and at the same time to protect their privacy and have a good user experience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology-Special Publication 800-145. NIST, Washington DC (2011). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

  2. Kaur, J., Garg, S.: Survey paper on security in cloud computing. Int. J. Appl. Stud. Prod. Manage. 1, 27–32 (2015)

    Google Scholar 

  3. Chang, V., Kuo, Y.-H., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016)

    Article  Google Scholar 

  4. Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223–240. Springer, Heidelberg (2005). doi:10.1007/11535218_14

    Chapter  Google Scholar 

  5. Bethencourt, J., Song, D., Waters, B.: New constructions and practical applications for private stream searching. In: 2006 IEEE Symposium on Security and Privacy, p. 6. IEEE (2006)

    Google Scholar 

  6. Danezis, G., Diaz, C.: Improving the decoding efficiency of private search. In: Proceedings of Dagstuhl Seminar. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006)

    Google Scholar 

  7. Adida, B., Wikström, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555–574. Springer, Heidelberg (2007). doi:10.1007/978-3-540-70936-7_30

    Chapter  Google Scholar 

  8. Yi, X., Bertino, E., Vaidya, J., Xing, C.: Private searching on streaming data based on keyword frequency. IEEE Trans. Dependable Secur. Comput. 11(2), 155–167 (2014)

    Article  Google Scholar 

  9. Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001). doi:10.1007/3-540-44586-2_9

    Chapter  Google Scholar 

  10. Liu, Q., Tan, C.C., Wu, J., Wang, G.: Cooperative private searching in clouds. J. Parallel Distrib. Comput. 72(8), 1019–1031 (2012)

    Article  MATH  Google Scholar 

  11. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)

    Google Scholar 

  12. Bethencourt, J., Song, D., Waters, B.: New techniques for private stream searching. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3), 16 (2009)

    Article  Google Scholar 

  13. Danezis, G., Diaz, C.: Space-efficient private search with applications to rateless codes. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 148–162. Springer, Heidelberg (2007). doi:10.1007/978-3-540-77366-5_15

    Chapter  Google Scholar 

  14. Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM (JACM) 45(6), 965–981 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  15. Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS, p. 364. IEEE (1997)

    Google Scholar 

  16. Olumofin, F., Goldberg, I.: Privacy-preserving queries over relational databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75–92. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14527-8_5

    Chapter  Google Scholar 

  17. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 44–55. IEEE (2000)

    Google Scholar 

  18. Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  19. Goh, E.-J., et al.: Secure indexes. IACR Cryptology ePrint Archive, 2003:216 (2003)

    Google Scholar 

  20. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). doi:10.1007/11496137_30

    Chapter  Google Scholar 

  21. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010)

    Google Scholar 

  22. Changhui, H., Han, L., Yiu, S.M.: Efficient and secure multi-functional searchable symmetric encryption schemes. Secur. Commun. Netw. 9(1), 34–42 (2016)

    Article  Google Scholar 

  23. O’Keeffe, M.: The Paillier cryptosystem: a look into the cryptosystem and its potential application, College of New Jersey (2008)

    Google Scholar 

  24. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). doi:10.1007/978-3-642-01001-9_13

    Chapter  Google Scholar 

  25. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152. ACM (2009)

    Google Scholar 

  26. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72738-5_19

    Chapter  Google Scholar 

  27. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). doi:10.1007/BFb0054122

    Chapter  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451, 61272151 and 61402161, and the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01, and the Hunan Provincial Natural Science Foundation of China (Grant No. 2015JJ3046).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Zhang, Q., Liu, Q., Wang, G. (2016). A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics