An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data

With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing. There are various searchable encryption schemes to ensure data availability. However, the existing search schem...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 6; pp. 21924 - 21933
Main Authors Peng, Tianyue, Lin, Yaping, Yao, Xin, Zhang, Wei
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing. There are various searchable encryption schemes to ensure data availability. However, the existing search schemes pay little attention to the efficiency of data users' queries, especially for the multi-owner scenario. In this paper, we proposed a tree-based ranked multi-keyword search scheme for multiple data owners. Specifically, by considering a large amount of data in the cloud, we utilize the TF <inline-formula> <tex-math notation="LaTeX">\times </tex-math></inline-formula> IDF model to develop a multi-keyword search and return the top-<inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula> ranked search results. To enable the cloud servers to perform a secure search without knowing any sensitive data (e.g., keywords and trapdoors), we construct a novel privacy-preserving search protocol based on the bilinear mapping. To achieve an efficient search, for each data owner, a tree-based index encrypted with an additive order and privacy-preserving function family is constructed. The cloud server can then merge these indexes effectively, using the depth-first search algorithm to find the corresponding files. Finally, the rigorous security analysis proves that our scheme is secure, and the performance analysis demonstrates its efficacy and efficiency.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2018.2828404