An Effective and Efficient Technique for Supporting Privacy-Preserving Keyword-Based Search over Encrypted Data in Clouds

Abstract Nowadays, cloud providers offer to their clients the possibility of storage of emails and files on the cloud server. To avoid privacy concerns, encryption should be applied to data. Unlike searching plaintext documents by keywords, encrypted documents cannot be retrieved in the same manner. As keyword searches on encrypted data are in demand, this paper describes an effective and efficient technique to support privacy-preserving keyword-based search over encrypted outsourced data. With this technique, encrypted data are first searched with the keyword, support for dynamic operations is then checked, and all relevant data documents are finally sorted based on the number of keywords matching the user query. To evaluate the technique, precision and recall are measured. The results reveal the effectiveness and efficiency of the technique in supporting privacy-preserving keyword-based search over encrypted outsourced data.

[1]  Alfredo Cuzzocrea,et al.  Effectively and Efficiently Designing and Querying Parallel Relational Data Warehouses on Heterogeneous Database Clusters: The F&A Approach , 2012, J. Database Manag..

[2]  Laks V. S. Lakshmanan,et al.  The segment support map: scalable mining of frequent itemsets , 2000, SKDD.

[3]  Wookey Lee,et al.  Effective privacy preserving data publishing by vectorization , 2020, Inf. Sci..

[4]  Michelangelo Ceci,et al.  Effectively and efficiently supporting roll-up and drill-down OLAP operations over continuous dimensions via hierarchical clustering , 2013, Journal of Intelligent Information Systems.

[5]  Yibin Zhang,et al.  An HSV-Based Visual Analytic System for Data Science on Music and Beyond , 2019, Int. J. Art Cult. Des. Technol..

[6]  Alfredo Cuzzocrea,et al.  Combining multidimensional user models and knowledge representation and management techniques for making web services knowledge-aware , 2006, Web Intell. Agent Syst..

[7]  Carson Kai-Sang Leung,et al.  Interactive discovery of influential friends from social networks , 2014, Social Network Analysis and Mining.

[8]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[9]  Carson Kai-Sang Leung,et al.  FpVAT: a visual analytic tool for supporting frequent pattern mining , 2010, SKDD.

[10]  Carson K. Leung,et al.  Interactive Mining of Strong Friends from Social Networks and Its Applications in E-Commerce , 2014, J. Organ. Comput. Electron. Commer..

[11]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[12]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[13]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[14]  Mohamed Medhat Gaber,et al.  An innovative framework for supporting big atmospheric data analytics via clustering-based spatio-temporal analysis , 2019, J. Ambient Intell. Humaniz. Comput..