Fast Privacy-Preserving Keyword Search on Encrypted Outsourced Data

Cloud providers offer storage as a service to the data owners to store emails and files on the cloud server. However, sensitive data should be encrypted before storing on the cloud server to avoid privacy concerns. With the encryption of documents, it is not feasible for data owners to retrieve documents based on keyword search as they can do with plain text documents. Hence, it is desirable to perform a multi-keyword search on encrypted data. To achieve this goal, we present a fast privacy-preserving model for keyword search on encrypted outsourced data in this paper. Specifically, the model first performs a keyword search on encrypted data and checks its support for dynamic operations. Based on keyword search results, it then sorts all the relevant data documents using the number of keywords matched for a given query. To evaluate its performance of our model, we applied the standard metrics like precision and recall. The results show the effectiveness of our privacy-preserving keyword search on encrypted outsourced data.

[1]  Abhinav Mishra,et al.  Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[2]  Babak Sadeghiyan,et al.  An Efficient Protocol for Oblivious DFA Evaluation and Applications , 2012, CT-RSA.

[3]  Alfredo Cuzzocrea,et al.  Privacy-Preserving Frequent Pattern Mining from Big Uncertain Data , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[4]  Carson Kai-Sang Leung,et al.  DeepGx: Deep Learning Using Gene Expression for Cancer Classification , 2019, 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[5]  Alfredo Cuzzocrea,et al.  High-Recall Information Retrieval from Linked Big Data , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[6]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[7]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[8]  Alfredo Cuzzocrea,et al.  Effectively and Efficiently Designing and Querying Parallel Relational Data Warehouses on Heterogeneous Database Clusters: The F&A Approach , 2012, J. Database Manag..

[9]  Avare Stewart,et al.  Detecting Health Events on the Social Web to Enable Epidemic Intelligence , 2011, SPIRE.

[10]  Qian Wang,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[11]  Carson Kai-Sang Leung,et al.  Mining weighted frequent sequences in uncertain databases , 2019, Inf. Sci..

[12]  Alfredo Cuzzocrea,et al.  Efficiently Compressing OLAP Data Cubes via R-Tree Based Recursive Partitions , 2012, ISMIS.

[13]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[14]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[15]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[16]  Alfredo Cuzzocrea,et al.  F&A: A Methodology for Effectively and Efficiently Designing Parallel Relational Data Warehouses on Heterogenous Database Clusters , 2010, DaWak.

[17]  Yibin Zhang,et al.  An HSV-Based Visual Analytic System for Data Science on Music and Beyond , 2019, Int. J. Art Cult. Des. Technol..

[18]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[19]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[21]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[22]  Carson Kai-Sang Leung Frequent Itemset Mining with Constraints , 2009, Encyclopedia of Database Systems.

[23]  Carson Kai-Sang Leung,et al.  Interactive discovery of influential friends from social networks , 2014, Social Network Analysis and Mining.

[24]  Rafail Ostrovsky,et al.  Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[25]  Wookey Lee,et al.  Effective privacy preserving data publishing by vectorization , 2020, Inf. Sci..

[26]  Michelangelo Ceci,et al.  Effectively and efficiently supporting roll-up and drill-down OLAP operations over continuous dimensions via hierarchical clustering , 2013, Journal of Intelligent Information Systems.

[27]  Carson K. Leung,et al.  Interactive Mining of Strong Friends from Social Networks and Its Applications in E-Commerce , 2014, J. Organ. Comput. Electron. Commer..

[28]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[29]  Alfredo Cuzzocrea,et al.  AI-Based Sensor Information Fusion for Supporting Deep Supervised Learning , 2019, Sensors.

[30]  Alfredo Cuzzocrea,et al.  A Theoretical Approach to Discover Mutual Friendships from Social Graph Networks , 2019, iiWAS.

[31]  Kanda Runapongsa Saikaew,et al.  Semi-Automatic Pig Weight Estimation Using Digital Image Analysis , 2019, Applied Engineering in Agriculture.

[32]  Wookey Lee,et al.  Information Technology-Based Patent Retrieval Models , 2019, Springer Handbook of Science and Technology Indicators.

[33]  Jia Wang,et al.  Toward Complex Search for Encrypted Cloud Data via Blind Index Storage , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).

[34]  Carson Kai-Sang Leung,et al.  A Data Science Model for Big Data Analytics of Frequent Patterns , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[35]  Laks V. S. Lakshmanan,et al.  The segment support map: scalable mining of frequent itemsets , 2000, SKDD.

[36]  Carson K. Leung,et al.  A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[37]  Carson Kai-Sang Leung,et al.  Exploring Social Networks: A Frequent Pattern Visualization Approach , 2010, 2010 IEEE Second International Conference on Social Computing.

[38]  Yue Shi Data Security and Privacy Protection in Public Cloud , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[39]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[40]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[41]  Carson Kai-Sang Leung,et al.  Web Page Recommendation from Sparse Big Web Data , 2018, 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI).

[42]  Jin Li,et al.  Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds , 2017, IEEE Transactions on Cloud Computing.

[43]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[44]  Alfredo Cuzzocrea,et al.  Big Graph Analytics: The State of the Art and Future Research Agenda , 2014, DOLAP '14.

[45]  Jonathan Katz,et al.  Secure text processing with applications to private DNA matching , 2010, CCS '10.

[46]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[47]  Carson Kai-Sang Leung,et al.  WeFreS: weighted frequent subgraph mining in a single large graph , 2019, ICDM.

[48]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[49]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[50]  Carson Kai-Sang Leung,et al.  Mining Weighted Frequent Patterns from Uncertain Data Streams , 2019, IMCOM.

[51]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[52]  Carson Kai-Sang Leung,et al.  WFSM-MaxPWS: An Efficient Approach for Mining Weighted Frequent Subgraphs from Edge-Weighted Graph Databases , 2018, PAKDD.

[53]  Carson Kai-Sang Leung,et al.  Discovering Correlation in Frequent Subgraphs , 2019, IMCOM.

[54]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[55]  Philip S. Yu,et al.  Privacy Preserving Utility Mining: A Survey , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[56]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.