skip to main content
10.1145/2940353.2940359acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Optimized ciphertext retrieval for cloud computing based on dynamic clustering

Published: 05 July 2016 Publication History

Abstract

With the extensive application of cloud storage, the amount of data stored in the server rapidly increases. At the same time, user documentation typically contains privacy-sensitive information that needs to be encrypted before uploaded to the cloud server. Facing such a large number of ciphertext data, the existing search technologies in retrieve of large amounts of data efficiency of the ciphertext data are fulfilling. To solve this problem, this paper makes improvement based on similarity search tree ciphertext retrieval method (MRSE-SS). In the big data environment, this paper proposes dynamic range clustering algorithm DIK-MEDOIDS. This method divides gap between the maximum and minimum document vectors into k slots. The size of the slots is hypersphere diameter, and the document vector which is closest to the middle value of the range is set as the hypersphere center. The size of each documentation slot depends on number of documents. Different with MRSS-SS algorithm, the proposed algorithm can search the qualified documents in the searching stage among hypersphere, to expand the cover of both documents and searching sets for returned data more in line with the user search need. With the increase of the documents, slots are dynamically determined. At the search stage, the search vector is represented as a hypersphere. Cloud server makes the determination through the position of search vector hypersphere and similarity search tree nodes. Along with the number of documents increasing, initialized time increases linearly, while the search stage is same with algorithms MRSE-SS which is shown in formula. When the document vector DC exponential grows, the time complexity is O (l).

References

[1]
Huang R W, Gui X L, Yu S, et al. Research on privacy-preserving cloud storage framework supporting ciphertext retrieval{C}//Network Computing and Information Security(NCIS), 2011 International Conference on. IEEE, 2011, 1: 93--97.
[2]
Kamara S, Lauter K. Cryptographic cloud storage{M}//Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010:136--149.
[3]
Wang C, Wang Q, Ren K, et al. Privacypreserving public auditing for data storage security in cloud computing {C}//INFOCOM, 2010 Proceedings IEEE. Ieee, 2010: 1--9.
[4]
Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing{M}//ComputerSecurity--ESORICS 2009. Springer BerlinHeidelberg, 2009: 355--370.
[5]
Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Titsworth FM, ed. 2000 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2000. 44--55. {
[6]
Goh EJ. Secure Indexes. Vol. 216: IACR Cryptology ePrint Archive, 2004. 1--19.
[7]
Wang C, Cao N, Li J, Ren K, Lou W. Secure ranked keyword search over encrypted cloud data. In: Guerrero JE. 2010 International Conference on Distributed Computing Systems. Los Alamitos, CA: IEEE Computer Society, 2010. 253--262.{
[8]
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: ASIA CCS'13 8th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2013. 71--82.{
[9]
Tian X, Zhu XJ, Shen PS, Chen C, Zou H. An efficient ciphertext search method based on similarity search tree. Ruan Jian Xue Bao/Journal of Software, 2016, 27(6):a18(in Chinese).http://www.jos.org.cn/1000-9825/4998.htm. {
[10]
Leslie H, Jain R, Birdsall D, Yaghmai H. Efficient Search of Multi-Dimensional B-Trees. In: Dayal U, ed. VLDB'95 Proceedings of the 21th International Conference on Very Large Data Bases. San Francisco, CA: Morgan Kaufmann Publishers Inc., 1995. 710--719.
[11]
Ciaccia P, Patella M, Rabitti F, Zezula P. Indexing Metric Spaces with M-Tree. In: Cristani M, ed. SEBD. 1997. 67--86.
[12]
Wang C, Cao N, Ren K, Lou WJ. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. on Parallel and Distributed Systems, 2012, 23(8):1467--1479.{
[13]
Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE. New York: IEEE Press, 2010. 1--9.{
[14]
Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel and Distributed Systems, IEEE Transactions on, 2014, 25(1): 222--233. {
[15]
Salton G, Buckley C. Term-weighting approaches in automatic text retrieval. Information processing & management, 1988, 24(5):513--523. {
[16]
White D, Jain R. Similarity indexing with the SS-tree. In: Proceedings of the Twelfth International Conference on Data Engineering. New York: IEEE Press, 1996: 516--523. {

Cited By

View all
  • (2022)Research on self‐learning system with “Internet + Education” innovative talents education mode under big data backgroundComputer Applications in Engineering Education10.1002/cae.2252531:3(662-675)Online publication date: 18-May-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSCC '16: Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication
July 2016
52 pages
ISBN:9781450343435
DOI:10.1145/2940353
  • General Chair:
  • Xiangyang Li
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 July 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ciphertext retrieval
  2. cloud storage
  3. hypersphere
  4. multiple keyword retrieval

Qualifiers

  • Research-article

Conference

MobiHoc'16
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6 of 6 submissions, 100%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Research on self‐learning system with “Internet + Education” innovative talents education mode under big data backgroundComputer Applications in Engineering Education10.1002/cae.2252531:3(662-675)Online publication date: 18-May-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media