Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud

With the rapid development of the IoT and the mobile applications, users are tending to outsource the data to the cloud servers. Thus, the encrypted data search on the cloud is very important. Now there are a lot existed keyword search schemes in which the relationship between the size of the file set and the search time is linear. In order to solve this problem, we propose a semantic retrieval framework for central word expansion based on two-level index. In this paper, we have taken a new approach for index construction - the two-level index to ensure that the retrieval time is not affected by the file size. In order to better meet the semantic requirements of user queries, we introduced the central word expansion technology to further improve the accuracy of the search. The main idea of central keyword extension semantic search (CKESS) based on two-level index is that match the expanded central keyword with index firstly, then compute the similarity between the query and the index under the first matching result, and finally return the result with the highest similarity. Our proposed solution meets the privacy protection requirements under two different threat models. Through the experiment of the real data set, we prove that our scheme is efficient, accurate and secure.

[1]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[2]  Piotr Indyk,et al.  Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.

[3]  Xiao Yu,et al.  Privacy-Preserving Ranked Multi-keyword Fuzzy Search on Cloud Encrypted Data Supporting Range Query , 2015 .

[4]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..

[5]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[6]  Jin Li,et al.  Multi-key Searchable Encryption without Random Oracle , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[7]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[8]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[9]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[10]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[11]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Ming Li,et al.  Circular range search on encrypted spatial data , 2015, CNS.

[13]  M. Chuah,et al.  Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[14]  Dekang Lin,et al.  An Information-Theoretic Definition of Similarity , 1998, ICML.

[15]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[16]  Zhihua Xia,et al.  Secure keyword-based Ranked Semantic Search over Encrypted Cloud Data , 2013 .

[17]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[18]  George A. Miller,et al.  Introduction to WordNet: An On-line Lexical Database , 1990 .

[19]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.