Abstract
Searchable Encryption is utilized to address the issue of searching for outsourced encrypted data on third-party untrusted cloud servers. Traditional approaches for ciphertext retrieval are limited to basic keyword-matching queries and fall short when it comes to handling complex semantic queries. Although several semantic retrieval schemes have been proposed in recent years, their performance is inadequate. This paper introduces a semantic retrieval scheme called CRE (Ciphertext Retrieval based on Encoder), which leverages the prompt-based RoBERTa pre-trained language model to generate precise embeddings for sentences in queries and documents. Moreover, to improve retrieval speed in the face of massive high-dimensional sentence embedding vectors, we introduce the HNSW algorithm. Through experimentation and theoretical analysis, this paper demonstrates that CRE outperforms \(SSSW_2\) and \(SSRB_2\) in terms of retrieval speed and accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahsan, M.M., Chowdhury, F.Z., Sabilah, M., Wahab, A.W.B.A., Idris, M.Y.I.B.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1–5. IEEE (2017)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2013)
Cer, D., Diab, M., Agirre, E., Lopez-Gazpio, I., Specia, L.: Semantic textual similarity-multilingual and cross-lingual focused evaluation. In: Proceedings of the 2017 SEMVAL International Workshop on Semantic Evaluation (2017). https://doi.org/10.18653/v1/s17-2001
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922. IEEE (2012)
Chen, Z., Wu, A., Li, Y., Xing, Q., Geng, S.: Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur. Commun. Netw. 2021, 1–11 (2021)
Cui, J., Sun, Y., Yan, X.U., Tian, M., Zhong, H.: Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci. China Inf. Sci. 65(5), 159102 (2022)
Cui, S., Song, X., Asghar, M.R., Galbraith, S.D., Russello, G.: Privacy-preserving dynamic symmetric searchable encryption with controllable leakage. ACM Trans. Privacy Secur. (TOPS) 24(3), 1–35 (2021)
Dai, H., Dai, X., Yi, X., Yang, G., Huang, H.: Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147, 102442 (2019)
Dauterman, E., Feng, E., Luo, E., Popa, R.A., Stoica, I.: Dory: an encrypted search system with distributed trust. In: Operating Systems Design and Implementation (2020)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2015)
Fu, Z., Wang, Y., Sun, X., Zhang, X.: Semantic and secure search over encrypted outsourcing cloud based on BERT. Front. Comput. Sci. 16, 1–8 (2022)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Fu, Z., Wu, X., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986–2997 (2017)
Hu, Z., Dai, H., Yang, G., Yi, X., Sheng, W.: Semantic-based multi-keyword ranked search schemes over encrypted cloud data. Secur. Commun. Netw. 2022 (2022)
Hua, Y., Zhang, D., Ge, S.: Research progress in the interpretability of deep learning models. J. Cyber Secur. 5(3), 1–12 (2020)
Jiang, T., et al.: Promptbert: improving BERT sentence embeddings with prompts. arXiv preprint arXiv:2201.04337 (2022)
Lee, J., Toutanova, K.: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)
Lewis, M., et al.: Bart: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461 (2019)
Liu, Y., Fu, Z.: Secure search service based on word2vec in the public cloud. Int. J. Comput. Sci. Eng. 18(3), 305–313 (2019)
Malkov, Y.A., Yashunin, D.A.: Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. IEEE Trans. Pattern Anal. Mach. Intell. 42(4), 824–836 (2018)
Moataz, T., Shikfa, A., Cuppens-Boulahia, N., Cuppens, F.: Semantic search over encrypted data. In: ICT 2013, pp. 1–5. IEEE (2013)
Nair, M.S., Rajasree, M.S., Thampi, S.M.: Fine-grained, multi-key search control in multi-user searchable encryption. In: International Workshops on Security, Privacy, and Anonymity in Computation, Communication, and Storage; IEEE International Symposium on Ubisafe Computing; IEEE International Workshop on Security in e-Science and e-Research; International Workshop on Trust, SE (2017)
Ravichandiran, S.: Getting Started with Google BERT: Build and train state-of-the-art natural language processing models using BERT. Packt Publishing Ltd (2021)
Xu, M., Namavari, A., Cash, D., Ristenpart, T.: Searching encrypted data with size-locked indexes. In: USENIX Security (2021)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44–55. IEEE (2000)
Su, J., Zhang, L., Mu, Y.: BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system, vol. 132, pp. 299–309 (2022)
Thakur, N., Reimers, N., Rücklé, A., Srivastava, A., Gurevych, I.: BEIR: a heterogenous benchmark for zero-shot evaluation of information retrieval models. arXiv preprint arXiv:2104.08663 (2021)
Veretennikov, A.B.: Relevance ranking for proximity full-text search based on additional indexes with multi-component keys (2021)
Xia, Z., Zhu, Y., Sun, X., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3, 1–11 (2014)
Yu-Jie, X., Lan-Xiang, C., Yi, M.: BTM topic model based searchable symmetric encryption. J. Cryptol. Res. 9(1), 88–105 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, K., Xu, S., Li, P., Zhang, D., Wang, W., Zou, B. (2024). CRE: An Efficient Ciphertext Retrieval Scheme Based on Encoder. In: Luo, B., Cheng, L., Wu, ZG., Li, H., Li, C. (eds) Neural Information Processing. ICONIP 2023. Communications in Computer and Information Science, vol 1966. Springer, Singapore. https://doi.org/10.1007/978-981-99-8148-9_10
Download citation
DOI: https://doi.org/10.1007/978-981-99-8148-9_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8147-2
Online ISBN: 978-981-99-8148-9
eBook Packages: Computer ScienceComputer Science (R0)