Cross-lingual multi-keyword rank search with semantic extension over encrypted data

Abstract The emergence of searchable encryption technology sheds new light on the problem of secure search over encrypted data, which has been a research hotspot in the past few years. However, most existing search schemes based on searchable encryption only support queries in a certain language. The few searchable encryption schemes that have implemented multilingual search fail to achieve automated cross-lingual retrieval, which significantly impacts users search experience. Additionally, most of these schemes only support the exact matching and can-not provide semantic search. Hence, the implementation of cross-lingual and semantic search together remains an open topic for searchable encryption. To the best of our knowledge, no previous research has investigated the problem of cross-lingual ranked search over encrypted cloud data. To address this issue, we propose a cross-lingual multi-keyword rank search (CLRSE) scheme upon the Open Multilingual Wordnet. Our CLRSE scheme can break the barrier of languages, and realizes intelligent and personalized search through flexible keyword and language preference settings. Additionally, an improved scheme is developed to speed up the sorting process. We evaluate the performance of our scheme including security, functionality, precision, and efficiency, with extensive experiments.

[1]  Yu Zhang,et al.  Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..

[2]  Jianhua Li,et al.  Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[3]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Francis Bond,et al.  Linking and Extending an Open Multilingual Wordnet , 2013, ACL.

[5]  Jian Shen,et al.  Towards achieving flexible and verifiable search for outsourced database in cloud computing , 2017, Future Gener. Comput. Syst..

[6]  Xingming Sun,et al.  Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.

[7]  Robert H. Deng,et al.  VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[8]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[9]  Siu-Ming Yiu,et al.  HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..

[10]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[11]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[12]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[13]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[14]  Rafail Ostrovsky,et al.  A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.

[15]  Keke Gai,et al.  Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..

[16]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[17]  Jin Li,et al.  Verifiable searchable encryption with aggregate keys for data sharing system , 2018, Future Gener. Comput. Syst..

[18]  Cong Wang,et al.  Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[19]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[20]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[21]  Yong Gan,et al.  A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .

[22]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[23]  Mihir Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.

[24]  Xiaofeng Chen,et al.  Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things , 2019, J. Netw. Comput. Appl..

[25]  Robert H. Deng,et al.  Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language , 2020, IEEE Transactions on Dependable and Secure Computing.

[26]  Mianxiong Dong,et al.  Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet , 2019, IEEE Communications Magazine.

[27]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[28]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[29]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Liehuang Zhu,et al.  Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems , 2021, IEEE Transactions on Dependable and Secure Computing.

[31]  Song Guo,et al.  An Efficient Privacy-Preserving Ranked Keyword Search Method , 2016, IEEE Transactions on Parallel and Distributed Systems.

[32]  Emmanuel Bresson,et al.  A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.

[33]  Lu Liu,et al.  A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..

[34]  Xingming Sun,et al.  Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.

[35]  Mohsen Guizani,et al.  PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[36]  Sai Ji,et al.  Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.