Abstract
With the development of education, educational big data is taking shape, and the cloud has a natural advantage of storing big data. Data is usually stored in the cloud server in the form of ciphertext for the sake of privacy protection. However, this is against the use of data. Currently, although the search schemes under ciphertext are primarily based on keywords, these schemes fail to reflect the actual needs of users well. Moreover, the quality of educational resources varies. Therefore, ensuring users’ privacy protection while providing high-quality educational resources is challenging. In order to solve this problem, a Smart Search over Encrypted Educational Resources (SSEER) in cloud storage was proposed in this paper. The contribution of this paper is mainly reflected in two aspects: First, SSEER introduces a trusted third party (TTP) server to obtain a large number of educational resources through crowdsourcing. Second, the index is updated based on the user’s use of educational resources, through which high-quality educational resources can be identified, thus increasing the probability for users to access quality resources. As a result, the educational resource graph can screen out the educational resources related to the user search.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bouguessa, M., Romdhane, L.B.: Identifying authorities in online communities. ACM Trans. Intell. Syst. Technol. (TIST) 6(3), 30 (2015)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2013)
Chai, W., Xu, W., Zuo, M., Wen, X.: ACQR: a novel framework to identify and predict influential users in micro-blogging. In: PACIS, p. 20 (2013)
Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: International Conference on Applied Cryptography and Network Security, pp. 442–455 (2005)
Chittilappilly, A.I., Chen, L., Amer-Yahia, S.: A survey of general-purpose crowdsourcing techniques. IEEE Trans. Knowl. Data Eng. 28(9), 2246–2266 (2016)
Cui, B., Liu, Z., Wang, L.: Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374–2385 (2016)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
Dan, B., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522 (2004)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24852-1_3
Howe, J.: Crowdsourcing: A definition (2006)
Howe, J.: The rise of crowdsourcing. Wired Mag. 14(6), 1–4 (2006)
Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017). 403C404
Li, H., Liu, D., Dai, Y., Luan, T.H., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97–109 (2018)
Li, J., Peng, W., Li, T., Sun, T., Li, Q., Xu, J.: Social network user influence sense-making and dynamics prediction. Expert Syst. Appl. 41(11), 5115–5124 (2014)
Liu, Q., Tan, C.C., Wu, J., Wang, G.: Towards differential query services in cost-efficient clouds. IEEE Trans. Parallel Distrib. Syst. 25(6), 1648–1658 (2014)
Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000. Proceedings, p. 0044 (2002)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262. IEEE (2010)
Wang, Q., He, M., Du, M., Chow, S.S., Lai, R.W., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. 15(3), 496–510 (2018)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data, pp. 139–152 (2009)
Xiao, F., Noro, T., Tokuda, T.: Finding news-topic oriented influential twitter users based on topic related hashtag community detection. J. Web Eng. 13(5&6), 405–429 (2014)
Yin, Z., Zhang, Y.: Measuring pair-wise social influence in microblog. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 502–507. IEEE (2012)
Zhang, Q., Liu, Q., Wang, G.: A privacy-preserving hybrid cooperative searching scheme over outsourced cloud data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 265–278 (2016)
Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541–31552 (2018)
Zhang, Q., Wang, G., Tang, W., Alinani, K., Liu, Q., Li, X.: Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176, 81–90 (2021)
Zhang, S., Choo, K.K.R., Liu, Q., Wang, G.: Enhancing privacy through uniform grid and caching in location-based services. Futur. Gener. Comput. Syst. 86, 881–892 (2018)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grants 61632009 & 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, in part by Scientific Research Fund of Hunan Provincial Education Department under Grants 19B208 & 20C0809 & 21A0599, in part by Project of Hunan Social Science Achievement Appraisal Committee in 2020 under Grant XSP20YBZ043, and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, Q., Duan, G., Liu, S. (2022). Smart Search over Encrypted Educational Resources in Cloud Storage. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_7
Download citation
DOI: https://doi.org/10.1007/978-981-19-0468-4_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0467-7
Online ISBN: 978-981-19-0468-4
eBook Packages: Computer ScienceComputer Science (R0)