skip to main content
10.1145/3155133.3155159acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Efficient Secure Text Retrieval on Multi-Keyword Search

Published: 07 December 2017 Publication History

Abstract

It is necessary to protect the data, while the data owner still let the users retrieve the information. In this paper, we present a secure text retrieval on multi keyword search, where the data owners and users can guarantee the privacy of their documents and searching keywords against the semi-trusted document servers while maintaining the functionality of ranked text retrieval. Our scheme also supports access control where the data owners can specify the users that can search and access their files. We build our scheme based on the term frequency ranking function that is widely used in many real text retrieval systems. Hence, the efficiency of our secure scheme is verified empirically with real text corpus.

References

[1]
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. 2005. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In Advances in Cryptology -- CRYPTO 2005.
[2]
Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill. 2007. Deterministic and Efficiently Searchable Encryption. In Advances in Cryptology - CRYPTO 2007. 535--552.
[3]
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88). 1--10.
[4]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004. 506--522.
[5]
Dan Boneh, Craig Gentry, and Brent Waters. 2005. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In Proceedings of the 25th Annual International Conference on Advances in Cryptology (CRYPTO'05). 258--275.
[6]
Dan Boneh and Brent Waters. 2007. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the 4th conference on Theory of cryptography (TCC'07). 535--554.
[7]
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2011. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In INFOCOM 2011. 829--837.
[8]
Yan-Cheng Chang and Michael Mitzenmacher. 2005. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Applied Cryptography and Network Security: Third International Conference, ACNS 2005. 442--455.
[9]
Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. 2006. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In Proceedings of the 13th ACM CCS (CCS '06). 79--88.
[10]
Amos Fiat and Moni Naor. 1994. Broadcast Encryption. In Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '93). 480--491.
[11]
Eu-Jin Goh. 2003. Secure Indexes. Cryptology ePrint Archive, Report 2003/216. http://eprint.iacr.org/2003/216/.
[12]
Vincenzo Iovino and Giuseppe Persiano. 2008. Hidden-Vector Encryption with Groups of Prime Order. In Proceedings of the 2nd international conference on Pairing-Based Cryptography (Pairing '08). 75--88.
[13]
Mehmet Kuzu, Mohammad Saiful Islam, and Murat Kantarcioglu. 2012. Efficient Similarity Search over Encrypted Data. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering (ICDE '12). 1156--1167.
[14]
Luís Marujo, José Portelo, David Martins de Matos, João P. Neto, Anatole Gershman, Jaime G. Carbonell, Isabel Trancoso, and Bhiksha Raj. 2014. Privacy-Preserving Important Passage Retrieval. In Proceeding of PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 7--12.
[15]
Wakaha Ogata and Kaoru Kurosawa. 2004. Oblivious keyword search. In Journal of Complexity, Vol. 20. 356--371.
[16]
Cengiz Örencik and Erkay Savaş. 2014. An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. In Distributed and Parallel Databases, Vol. 32.
[17]
Hweehwa Pang, Jialie Shen, and Ramayya Krishnan. 2010. Privacy-preserving Similarity-based Text Retrieval. In ACM Trans. Internet Technol., Vol. 10. 4:1--4:39.
[18]
Dong Jin Park, Kihyun Kim, and Pil Joong Lee. 2005. Public Key Encryption with Conjunctive Field Keyword Search. In Information Security Applications: 5th International Workshop, WISA 2004. 73--86.
[19]
Michael J. Pazzani and Amnon Meyers. November 18, 2003. NSF Research Awards Abstracts 1990--2003. https://archive.ics.uci.edu/ml/machine-learning-databases/nsfabs-mld/nsfawards.data.html. (November 18, 2003).
[20]
Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, and Mario Strefler. 2013. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. In International Journal of Information Security, Vol. 12. 251--265.
[21]
Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP '00). 44--.
[22]
Mikhail Strizhov and Indrajit Ray. 2014. Multi-keyword Similarity Search over Encrypted Cloud Data. In ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. 52--65.
[23]
Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, and Hui Li. 2013. Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking. In Proceedings of the 8th ACM SIGSAC (ASIA CCS '13). 71--82.
[24]
Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou. 2010. Secure Ranked Keyword Search over Encrypted Cloud Data. In Proceedings of the 2010 IEEE 30th ICDCS. 253--262.
[25]
Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. 2009. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. In Information Security Applications: 9th International Workshop, WISA 2008.
[26]
Brent Waters, Dirk Balfanz, Glenn Durfee, and D. K. Smetters. 2004. Building an Encrypted and Searchable Audit Log. In In The 11th Annual Network and Distributed System Security Symposium.
[27]
Justin Zobel and Alistair Moffat. 2006. Inverted Files for Text Search Engines. ACM Comput. Surv. 38, 2 (2006).

Cited By

View all
  • (2021)Fuzzy retrieval of encrypted data by multi-purpose data-structuresSignal and Data Processing10.29252/jsdp.17.4.12317:4(123-138)Online publication date: 1-Feb-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SoICT '17: Proceedings of the 8th International Symposium on Information and Communication Technology
December 2017
486 pages
ISBN:9781450353281
DOI:10.1145/3155133
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • SOICT: School of Information and Communication Technology - HUST
  • NAFOSTED: The National Foundation for Science and Technology Development

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Text retrieval
  2. computational security
  3. keyword search
  4. ranking
  5. secret sharing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SoICT 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Fuzzy retrieval of encrypted data by multi-purpose data-structuresSignal and Data Processing10.29252/jsdp.17.4.12317:4(123-138)Online publication date: 1-Feb-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media