Approach to keyword search over encrypted data in cloud
With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approa...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539677534814208 |
---|---|
author | Peng ZHANG Yan LI Hai-lun LIN Rong YANG Qing-yun LIU |
author_facet | Peng ZHANG Yan LI Hai-lun LIN Rong YANG Qing-yun LIU |
author_sort | Peng ZHANG |
collection | DOAJ |
description | With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency. |
format | Article |
id | doaj-art-ad07cad147e94c62a5f9c6a7613d3b0e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ad07cad147e94c62a5f9c6a7613d3b0e2025-01-14T06:45:11ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-11-013514715359689199Approach to keyword search over encrypted data in cloudPeng ZHANGYan LIHai-lun LINRong YANGQing-yun LIUWith the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/privacy-preservingcloud computingorder-preserving encryptionone-to-many order-preserving mapping |
spellingShingle | Peng ZHANG Yan LI Hai-lun LIN Rong YANG Qing-yun LIU Approach to keyword search over encrypted data in cloud Tongxin xuebao privacy-preserving cloud computing order-preserving encryption one-to-many order-preserving mapping |
title | Approach to keyword search over encrypted data in cloud |
title_full | Approach to keyword search over encrypted data in cloud |
title_fullStr | Approach to keyword search over encrypted data in cloud |
title_full_unstemmed | Approach to keyword search over encrypted data in cloud |
title_short | Approach to keyword search over encrypted data in cloud |
title_sort | approach to keyword search over encrypted data in cloud |
topic | privacy-preserving cloud computing order-preserving encryption one-to-many order-preserving mapping |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/ |
work_keys_str_mv | AT pengzhang approachtokeywordsearchoverencrypteddataincloud AT yanli approachtokeywordsearchoverencrypteddataincloud AT hailunlin approachtokeywordsearchoverencrypteddataincloud AT rongyang approachtokeywordsearchoverencrypteddataincloud AT qingyunliu approachtokeywordsearchoverencrypteddataincloud |