Skip to main content
Log in

Preferred search over encrypted data

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Cloud computing provides elastic data storage and processing services. Although existing research has proposed preferred search on the plaintext files and encrypted search, no method has been proposed that integrates the two techniques to efficiently conduct preferred and privacy-preserving search over large datasets in the cloud.

In this paper, we propose a scheme for preferred search over encrypted data (PSED) that can take users’ search preferences into the search over encrypted data. In the search process, we ensure the confidentiality of not only keywords but also quantified preferences associated with them. PSED constructs its encrypted search index using Lagrange coefficients and employs secure inner-product calculation for both search and relevance measurement. The dynamic and scalable property of cloud computing is also considered in PSED. A series of experiments have been conducted to demonstrate the efficiency of the proposed scheme when deploying it in real-world scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50–58

    Article  Google Scholar 

  2. Ren Y J, Shen J, Wang J, Han J, Lee S Y. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 2015, 16(2): 317–323

    Google Scholar 

  3. Ma T H, Zhou J J, Tang M L, Tian Y, Dhelaan A, Rodhaan A, Lee S Y. Social network and tag sources based augmenting collaborative recommender system. IEICE transactions on Information and Systems, 2015, E98–D(4): 902–910

    Article  Google Scholar 

  4. Shu J W, Shen Z R, Xue W. Shield: a stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 2014, 74(9): 2872–2883

    Article  Google Scholar 

  5. Shu J W, Shen Z R, Xue W, Fu Y X. Secure storage system and key technologies. In: Proceedings of Asia and South Pacific Design Automation Conference. 2013, 376–383

    Google Scholar 

  6. Cai K, Hong C, Zhang M, Feng D G, Lv Z Q. A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science. 2013, 339–346

    Google Scholar 

  7. Guo H, Li Z J, Mu Y, Zhang X Y. Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Science, 2011, 181(3): 628–647

    Article  MathSciNet  MATH  Google Scholar 

  8. Koutrika G, Ioannidis Y. Personalized queries under a generalized preference model. In: Proceedings of International Conference on Data Engineering. 2005, 841–852

    Google Scholar 

  9. Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829–837

    Google Scholar 

  10. Okamoto T, Takashima W. Hierarchical predicate encryption for innerproducts. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2009, 241–237

    Google Scholar 

  11. Wong W K, Cheung D W, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data. 2009, 139–152

    Chapter  Google Scholar 

  12. Yu S C, Wang C, Ren K, Lou W J. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE International Conference on Computer Communications. 2010, 534–542

    Google Scholar 

  13. LiM, Yu S C, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 383–392

    Google Scholar 

  14. Pervez Z, Awan A, Khattak A, Lee S, Huh E. Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 2013, 63(2): 538–560.

    Article  Google Scholar 

  15. Cao N, Yang Z Y, Wang C, Lou W J. Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 393–402

    Google Scholar 

  16. Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 506–522

    Google Scholar 

  17. Lu Y. Privacy-preserving logarithmic-time search on encrypted data in cloud. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium. 2012

    Google Scholar 

  18. Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 253–262

    Google Scholar 

  19. Witten I, Moffat A, Bell T. Managing Gigabytes: Compressing and Indexing Documents and Images. San Mateo, CA: Morgan Kaufmann Publishers, 1999

    MATH  Google Scholar 

  20. Yan T W, Garcia-Molina H. Sift: a tool for wide-area information dissemination. In: Proceedings of USENIX Annual Technical Conference. 1995, 16–20

    Google Scholar 

  21. Liu WY, Chen Z, Lin F, Zhang H J, Ma WY. Ubiquitous media agents: a framework for managing personally accumulated multimedia files. Multimedia Systems, 2003, 9(2): 144–156

    Article  Google Scholar 

  22. Good N, Schafer J, Konstan J, Borchers A, Sarway B, Herlocker J, Biedl J. Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the 16th National Conference on Artificial Intelligence and 11th Conference on Innovative Applications of Artificial Intelligence. 1999, 439–446

    Google Scholar 

  23. Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2008, 146–162

    Google Scholar 

  24. Yang X, Liu L, Global I. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. Hershey, PA: Business Science Reference, 2013

    Book  Google Scholar 

  25. Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the International Conference on Applied Cryptography and Network Security. 2004, 31–45

    Chapter  Google Scholar 

  26. Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 350–364

    Google Scholar 

  27. Stefanidis K, Drosou M, Pitoura E. PerK: personalized keyword search in relational databases through preferences. In: Proceedings of International Conference on Extending Database Technology. 2010, 585–596

    Chapter  Google Scholar 

  28. Leubner A, Kiessling W. Personalized keyword search with partialorder preferences. In: Proceedings of Brazilian Symposium on Databases. 2002, 181–193

    Google Scholar 

  29. Chomicki J. Preference formulas in relational queries. ACM Transaction on Database Systems, 2003, 28(4): 427–466

    Article  MathSciNet  Google Scholar 

  30. Kiessling W. Foundations of preferences in database systems. In: Proceedings of International Conference on Very Large Data Bases. 2002, 311–322

    Chapter  Google Scholar 

  31. Georgiadis P, Kapantaidakis I, Christophides V, Nguer E, Spyratos N. Efficient rewriting algorithms for preference queries. In: Proceedings of International Conference on Data Engineering. 2008, 1101–1110

    Google Scholar 

  32. Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44–55

    Google Scholar 

  33. Goh E J. Secure indexes. IACR Cryptology ePrint Archive, 2003

    Google Scholar 

  34. Bloom B. Spacetime trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426

    Article  MATH  Google Scholar 

  35. Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proceedings of Network and Distributed System Security Symposium. 2004

    Google Scholar 

  36. Wang C, Cao N, Ren K, Lou WJ. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1467–1479

    Article  Google Scholar 

  37. Wang C, Ren K, Yu S C, Urs K. Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2012, 451–459

    Google Scholar 

  38. Li J, Wang Q, Wang C, Cao N, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 441–445

    Google Scholar 

  39. Sun W H, Wang B, Cao N, Li M, Lou W J, Hou Y, Li H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ACM Symposium on Information, Computer and Communications Security. 2013, 71–82

    Google Scholar 

  40. Shen Z R, Shu J W, Xue W. Keyword search with access control over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2014, 87–92

    Google Scholar 

  41. Shen Z R, Shu J W, Xue W. Preferred keyword search over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2013, 207–212

    Google Scholar 

  42. Li J W, Li J, Chen X F, Jia C F, Liu Z L. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of International Conference on Network and System Security. 2012, 490–502

    Chapter  Google Scholar 

  43. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89–98

    Google Scholar 

  44. Fu Z J, Wu X L, Guan C W, Sun X M, Ren K. Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716

    Article  Google Scholar 

  45. Xia Z H, Wang X H, Sun X M, Wang Q. A secure and dynamic multikeyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(2): 340–352

    Article  Google Scholar 

  46. Fu Z J, Ren K, Shu J G, Sun X M, Huang F X. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(9): 2546–2559

    Article  Google Scholar 

  47. Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 2015, E98–B(1): 190–200

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous reviewers for their comments and suggestions. This work was supported by the National Key R&D Program (2016YFA0602103), the National Natural Science Foundation of China (Grant Nos. 61232003, 61433008, 91530323, 61602120, and 61361120098), and the Beijing Municipal Science and Technology Commission of China (D151100000815003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiwu Shu.

Additional information

Zhirong Shen received a bachelor’s degree from the University of Electronic Science and Technology of China, China in 2010, and a PhD from Tsinghua University, China in 2016. He is now a postdoctoral fellow at the Chinese University of Hong Kong, China. His current research interests include storage reliability and storage security.

Jiwu Shu received a PhD degree in computer science from Nanjing University, China in 1998, and finished the postdoctoral position research at Tsinghua University, China in 2000. Since then, he has been teaching at Tsinghua University. His current research interests include storage security and reliability, non-volatile memory-based storage systems, and parallel and distributed computing. He is a member of the IEEE.

Wei Xue is an associate professor in Department of Computer Science and Technology and Center of Earth System Science in Tsinghua University, China. His research interests include high-performance computing, uncertainty quantification for climate system model. He is a senior member of the CCF and a member of the IEEE and ACM.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, Z., Shu, J. & Xue, W. Preferred search over encrypted data. Front. Comput. Sci. 12, 593–607 (2018). https://doi.org/10.1007/s11704-016-6244-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-016-6244-5

Keywords