Skip to main content

A Ciphertext Data Retrieval Method Based on Cloud Storage

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3236 Accesses

Abstract

For the problem of mass data encryption retrieval in the cloud storage system, a three-step ciphertext data retrieval method is proposed. In this method, we introduce inverted index as the index structure, adopt the fully homomorphic and privacy homomorphism encryption algorithm and design a three-step retrieval strategy. The first step matches on the ciphertext index precisely, and the other two extend the word into other forms and correct the wrong word to query again. The latter two steps will be executed under the circumstance that the returned result is lower than the pre-set threshold. This ciphertext data retrieval method based on cloud storage improve the privacy of stored data and makes every effort to render users obtain the result they expect. The proof shows it is effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cloud Storage, http://en.wikipedia.org/wiki/Cloud_storage

  2. Shen, J.: Research of Cloud Storage and Its Security. J. Computer Knowledge and Technology 7, 3829–3832 (2011)

    Google Scholar 

  3. Huang, Y., Zhang, J., Li, X.: Encrypted Storage and Its Retrieval in Cloud Storage Applications. J. ZTE Communication 16, 33–35 (2010)

    Google Scholar 

  4. Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: The IEEE Symposium on Security and Privacy(S&P 2000), pp. 44–55. IEEE, Piscataway (2000)

    Google Scholar 

  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73–86. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Guo, L., Yao, H.: Research on Encrypted Database Search Method based on Inverted Index. J. Computer Science 9, 13–15 (2010)

    Google Scholar 

  8. Liang, Y., Lu, J., Liu, L., Zhang, C.: Vague-keyword Search under Encrypted Environment in Cloud Computing. J. Computer Science 38, 99–100 (2011)

    Google Scholar 

  9. Zhao, X., Ye, Z.: Research and Comparison of Several Database Encryption Technologies. J. Computer Technology and Development 17, 219–222 (2007)

    Google Scholar 

  10. Dai, Y., Shang, J., Su, Z.: Quick Index on Encrypted Database. J. Journal of Tsinghua University (Sci. & Tech.) 37, 24–27 (1997)

    Google Scholar 

  11. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphism. In: DeMillo, R.D. (ed.) Foundations of Secure Computations, pp. 169–177. Academic Press (1978)

    Google Scholar 

  12. Swaminathan, A., Mao, Y., Su, G.M., et al.: Confidentiality-Preserving Rank-Ordered Search. In: The 2007 ACM Workshop on Storage Security and Survivability (StorageSS 2007), pp. 7–12. ACM, New York (2007)

    Chapter  Google Scholar 

  13. Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: The 41st Annual ACM Symposium on Theory of Computing (STOC 2009), pp. 169–178. ACM, New York (2009)

    Chapter  Google Scholar 

  14. Norvig, P.: How to Write a Spelling Corrector, http://norvig.com/spell-correct.html

  15. Wang, X., Shangping, W., Qin, B.: Research on Database Encrypt ion and Verification Methods. Journal of Xi’an University of Technology 18, 263–268 (2002)

    Google Scholar 

  16. Levenshtein: О границах для упаковок в n-мерном евклидовом пространстве. Doklady Akademii Nauk SSR  245, 1299–1303 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zheng, S., Wang, S., Wang, C. (2013). A Ciphertext Data Retrieval Method Based on Cloud Storage. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics