Privacy-preserving ranked search over encrypted cloud data

Warning The system is temporarily closed to updates for reporting purpose.

Örencik, Cengiz (2014) Privacy-preserving ranked search over encrypted cloud data. [Thesis]

PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader

Official URL: http://risc01.sabanciuniv.edu/record=b1589828 (Table of Contents)


Search over encrypted data recently became a critical operation that raised a considerable amount of interest in both academia and industry, especially as outsourcing sensitive data to cloud proves to be a strong trend to benefit from the unmatched storage and computing capacities thereof. Indeed, privacy-preserving search over encrypted data, an apt term to address privacy related issues concomitant in outsourcing sensitive data, has been widely investigated in the literature under different models and assumptions. Although its benefits are welcomed, privacy is still a remaining concern that needs to be addressed. Some of those privacy issues can be summarized as: submitted search terms and their frequencies, returned responses and their relevancy to the query, and retrieved data items may all contain sensitive information about the users. In this thesis, we propose two di erent multi-keyword search schemes that ensure users' privacy against both external adversaries including other authorized users and cloud server itself. The proposed schemes use cryptographic techniques as well as query and response randomization. Provided that the security and randomization parameters are appropriately chosen, both the search terms in the queries and the returned responses are protected against privacy violations. The scheme implements strict security and privacy requirements that essentially can hide similarities between the queries that include the same keywords. One of the main advantages of all the proposed methods in this work is the capability of multi-keyword search in a single query. We also incorporate effective ranking capabilities in the proposed schemes that enable user to retrieve only the top matching results. Our comprehensive analytical study and extensive experiments using both real and synthetic data sets demonstrate that the proposed schemes are privacy-preserving, effective, and highly efficient.

Item Type:Thesis
Uncontrolled Keywords:Searchable encryption. -- Privacy. -- Cloud computing. -- Ranking. -- Applied cryptography. -- Homomorphic encryption. -- Arama yapılabilir şifreleme. -- Mahremiyet. -- Bulut bilişim. -- Sıralama. -- Uygulamal Kriptografi -- Homomorfik şifreleme.
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
ID Code:32394
Deposited By:IC-Cataloging
Deposited On:21 Jun 2017 16:09
Last Modified:25 Mar 2019 17:18

Repository Staff Only: item control page