Abstract
As an important way of communication, the wireless network has brought great convenience to people’s life because of its rapid development. It is a hot topic to protect the data of the wireless network stored in the cloud. In order to solve the problem, this paper presents a privacy protection scheme based on confusing keyword. Based on user history retrieval data, the choosing and embedding of confusing keyword can be selectively implemented. Different from adding random values at the end of the vectors which was generated in other schemes, the embedding time of confusing keyword is selected before the generation of vectors in this paper, so as to truly achieve “random” effect and protect user privacy. In order to eliminate the unrelated documents caused by the matching of confusing keyword, this paper proposes a secondary search scheme based on confusing keyword in scheme 2. Through the construction of two trapdoors, two screenings are performed to ensure the accuracy of the data. Experiments based on real data demonstrate the effectiveness of the two schemes in this paper.
Similar content being viewed by others
References
Zhangjie F, Xu J, Zhu Z, Liu AX, Sun X Writing in the air with WiFi signals for virtual reality devices. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2018.2831709
Qiu T, Zhao A, Xia F, Si W, Wu DO (2017) ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Networking 25(5):2944–2959
Qiu T, Qiao R, Wu DO (2018) EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans Mob Comput 17(1):72–84
Qiu T, Chen N, Li K, Atiquzzaman M, Zhao W (2018) How can heterogeneous internet of things build our future: a survey. IEEE Communications Surveys and Tutorials. https://doi.org/10.1109/COMST.2018.2803740
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data [C]. Proceedings of IEEE symposium on security and privacy, pp 44–55
Goh E-J (2003) Secure indexes [J]. IACR Cryptology ePrint Archive
Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data [C]. Applied cryptography and network security, pp 442–455
Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions [C]. Proceedings of the 13th ACM conference on computer and communications security, pp 79–88
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search [C]. Advances in cryptology-eurocrypt, pp 506–522
Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+ r: top-k retrieval from a confidential index [C]. Proceedings of the 12th International conference on extending database technology: advances in database technology, pp 439–449
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search [C]. Proceedings of the 2007 ACM workshop on storage security and survivability, pp 7–12
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data [C]. Proceedings of IEEE 30th international conference on distributed computing systems, pp 253–262
Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 23(8):1467–1479
Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. Parallel and Distributed Systems, IEEE Transactions on 25(1):222–233
Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data [C]. Proceedings of international conference on cloud and service computing, pp 104–110
Zhu Y, Xu R, Takagi T (2013) Secure k-NN computation on encrypted cloud data without sharing key with query users [C]. Proceedings of international workshop on security in cloud computing, pp 55–60
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [C]. Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 71–82
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):1–1
Wu X, Fu Z, Sun X (2017) Text-based searchable encryption in cloud: a survey. Journal of Internet Technology 18(1):207–213
Bringer J, Chabanne H (2012) Embedding edit distance to enable private keyword search [J]. Human-centric Computing and Information Sciences 2(1):1–12
Wang B, Yu S, Lou W (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [C]. Proceedings of IEEE INFOCOM, pp 2112–2120
Fu Z, Wu X, Wang Q, Ren K Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2017.2730365
Fu Z, Xia L, Sun X, Liu AX, Xie G (2018) Semantic aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security 13(9):2359–2371
Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172
Li J, Liu Z, Chen X, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.03.006
Fu Z, Sun X, Xi J (2015) Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication. J Commun Netw 17(5):525–533
Gao C-z, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72–88
Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11
Li T, Li J, Liu Z, Li P, Jia C (2018) Differentially private naive Bayes learning over multiple data sources. Inf Sci 444:89–104
Weng J, Weng J, Zhang Y, Luo W, Lan W (2018) BENBI: Scalable and dynamic access control on the northbound interface of SDN-based VANET. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2018.2880238
Yang A, Xu J, Weng J, Zhou J, Wong DS (2018) Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2018.2851256
Chen X, Weng J, Lu W, Xu J (2017) Multi-gait recognition based on attribute discovery. IEEE Trans Pattern Anal Mach Intell 40(7):1697–1710
Lin Q, Li J, Huang Z, Chen W, Shen J (2018) A short linearly homomorphic proxy signature scheme. IEEE Access 6:12966–12972
Xu Z, Kang W, Li R et al (2012) Efficient multi-keyword ranked query on encrypted data in the cloud[C]. Parallel and distributed systems (ICPADS), 2012 IEEE 18th international conference on. IEEE, pp 244–251
Dobbertin H, Rijmen V (2005) Advanced encryption standard-AES: 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004, revised selected and invited papers [M]. Springer Science & Business Media
Acknowledgments
This work is supported by the National Natural Science Foundation of China under grant U1836110, 61772283, U1536206, U1405254, 61602253, 61672294, 61502242; by the National Key R&D Program of China under grant 2018YFB1003205; by China Postdoctoral Science Foundation (2017M610574); by The Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; by the Major Program of the National Social Science Fund of China (17ZDA092), Qing Lan Project, Meteorology Soft Sciences Project; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fu, Z., Liu, Y., Sun, X. et al. Confusing-Keyword Based Secure Search over Encrypted Cloud Data. Mobile Netw Appl 25, 125–132 (2020). https://doi.org/10.1007/s11036-018-1195-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1195-8