Örencik, Cengiz and Selçuk, Ayşe and Savaş, Erkay and Kantarcıoğlu, Murat (2016) Multi-keyword search over encrypted data with scoring and search pattern obfuscation. International Journal of Information Security, 15 (3). pp. 251-269. ISSN 1615-5262 (Print) 1615-5270 (Online)
This is the latest version of this item.
PDF
article_02.pdf
Restricted to Registered users only
Download (866kB) | Request a copy
article_02.pdf
Restricted to Registered users only
Download (866kB) | Request a copy
Official URL: http://dx.doi.org/10.1007/s10207-015-0294-9
Abstract
Search over encrypted data recently became a critical operation that raised a considerable amount of interest in both academia and industry. Especially, as outsourcing, sensitive data to cloud prove to be a strong trend to benefit from the unmatched storage and computing capacities thereof. Indeed, privacy-preserving search over encrypted data, an apt term to address privacy-related issues concomitant in outsourcing sensitive data, have been widely investigated in the literature under different models and assumptions. In this work, we propose an efficient scheme that allows privacy-preserving search over encrypted data using queries with multiple keywords. Most important contributions of this work are as follows. Firstly, using a property referred as -mean query obfuscation, the proposed scheme hides the search patterns, which are allowed to leak in many works in the literature including our preliminary work on the subject Orencik et al. (2013) [1]. Secondly, a two-server setting is employed to eliminate the correlation between the queries and matching documents sent to the user under the assumption that the two servers are not colluding. Thirdly, we propose a novel compression scheme that reduces both the communication cost between the two servers and the computation cost of the search operation more than 55 times compared to the standard approach. And finally, the proposed scheme also provides an effective scoring and ranking capability that is based on term frequency-inverse document frequency (tf-idf) weights of keyword-document pairs. Our analyses demonstrate that the proposed scheme is privacy-preserving, efficient and effective.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Encrypted cloud data; Secure search; Privacy preservation; Efficiency; Scoring |
Subjects: | Q Science > QA Mathematics > QA075 Electronic computers. Computer science Q Science > QA Mathematics > QA076 Computer software |
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Erkay Savaş |
Date Deposited: | 11 Nov 2016 22:46 |
Last Modified: | 26 Apr 2022 09:37 |
URI: | https://research.sabanciuniv.edu/id/eprint/30190 |
Available Versions of this Item
-
Multi-keyword search over encrypted data with scoring and search pattern obfuscation. (deposited 22 Dec 2015 14:47)
- Multi-keyword search over encrypted data with scoring and search pattern obfuscation. (deposited 11 Nov 2016 22:46) [Currently Displayed]