Approach to keyword search over encrypted data in cloud

With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approa...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng ZHANG, Yan LI, Hai-lun LIN, Rong YANG, Qing-yun LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539677534814208
author Peng ZHANG
Yan LI
Hai-lun LIN
Rong YANG
Qing-yun LIU
author_facet Peng ZHANG
Yan LI
Hai-lun LIN
Rong YANG
Qing-yun LIU
author_sort Peng ZHANG
collection DOAJ
description With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.
format Article
id doaj-art-ad07cad147e94c62a5f9c6a7613d3b0e
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ad07cad147e94c62a5f9c6a7613d3b0e2025-01-14T06:45:11ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-11-013514715359689199Approach to keyword search over encrypted data in cloudPeng ZHANGYan LIHai-lun LINRong YANGQing-yun LIUWith the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/privacy-preservingcloud computingorder-preserving encryptionone-to-many order-preserving mapping
spellingShingle Peng ZHANG
Yan LI
Hai-lun LIN
Rong YANG
Qing-yun LIU
Approach to keyword search over encrypted data in cloud
Tongxin xuebao
privacy-preserving
cloud computing
order-preserving encryption
one-to-many order-preserving mapping
title Approach to keyword search over encrypted data in cloud
title_full Approach to keyword search over encrypted data in cloud
title_fullStr Approach to keyword search over encrypted data in cloud
title_full_unstemmed Approach to keyword search over encrypted data in cloud
title_short Approach to keyword search over encrypted data in cloud
title_sort approach to keyword search over encrypted data in cloud
topic privacy-preserving
cloud computing
order-preserving encryption
one-to-many order-preserving mapping
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.z2.020/
work_keys_str_mv AT pengzhang approachtokeywordsearchoverencrypteddataincloud
AT yanli approachtokeywordsearchoverencrypteddataincloud
AT hailunlin approachtokeywordsearchoverencrypteddataincloud
AT rongyang approachtokeywordsearchoverencrypteddataincloud
AT qingyunliu approachtokeywordsearchoverencrypteddataincloud