Abstract
For the problem of mass data encryption retrieval in the cloud storage system, a three-step ciphertext data retrieval method is proposed. In this method, we introduce inverted index as the index structure, adopt the fully homomorphic and privacy homomorphism encryption algorithm and design a three-step retrieval strategy. The first step matches on the ciphertext index precisely, and the other two extend the word into other forms and correct the wrong word to query again. The latter two steps will be executed under the circumstance that the returned result is lower than the pre-set threshold. This ciphertext data retrieval method based on cloud storage improve the privacy of stored data and makes every effort to render users obtain the result they expect. The proof shows it is effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cloud Storage, http://en.wikipedia.org/wiki/Cloud_storage
Shen, J.: Research of Cloud Storage and Its Security. J. Computer Knowledge and Technology 7, 3829–3832 (2011)
Huang, Y., Zhang, J., Li, X.: Encrypted Storage and Its Retrieval in Cloud Storage Applications. J. ZTE Communication 16, 33–35 (2010)
Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: The IEEE Symposium on Security and Privacy(S&P 2000), pp. 44–55. IEEE, Piscataway (2000)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Park, D.J., Kim, K., Lee, P.J.: Public Key Encryption with Conjunctive Field Keyword Search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73–86. Springer, Heidelberg (2005)
Guo, L., Yao, H.: Research on Encrypted Database Search Method based on Inverted Index. J. Computer Science 9, 13–15 (2010)
Liang, Y., Lu, J., Liu, L., Zhang, C.: Vague-keyword Search under Encrypted Environment in Cloud Computing. J. Computer Science 38, 99–100 (2011)
Zhao, X., Ye, Z.: Research and Comparison of Several Database Encryption Technologies. J. Computer Technology and Development 17, 219–222 (2007)
Dai, Y., Shang, J., Su, Z.: Quick Index on Encrypted Database. J. Journal of Tsinghua University (Sci. & Tech.) 37, 24–27 (1997)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homomorphism. In: DeMillo, R.D. (ed.) Foundations of Secure Computations, pp. 169–177. Academic Press (1978)
Swaminathan, A., Mao, Y., Su, G.M., et al.: Confidentiality-Preserving Rank-Ordered Search. In: The 2007 ACM Workshop on Storage Security and Survivability (StorageSS 2007), pp. 7–12. ACM, New York (2007)
Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: The 41st Annual ACM Symposium on Theory of Computing (STOC 2009), pp. 169–178. ACM, New York (2009)
Norvig, P.: How to Write a Spelling Corrector, http://norvig.com/spell-correct.html
Wang, X., Shangping, W., Qin, B.: Research on Database Encrypt ion and Verification Methods. Journal of Xi’an University of Technology 18, 263–268 (2002)
Levenshtein: О границах для упаковок в n-мерном евклидовом пространстве. Doklady Akademii Nauk SSR 245, 1299–1303 (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zheng, S., Wang, S., Wang, C. (2013). A Ciphertext Data Retrieval Method Based on Cloud Storage. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)