Abstract
With the rapid development of Cloud Computing, how to improve users search experience over encrypted data just like plaintext search has become a challenging task. In this paper, we propose a hierarchical semantic approximate multi-keyword ranked search (HSAMS) scheme over encrypted data. Performance analysis is demonstrated that our proposed scheme is efficient and effective while supporting semantic approximate match.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Fu, Z., Wu, X., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986–2997 (2017)
Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127–138 (2015)
Ma, R., Li, J., Guan, H., Xia, M., Liu, X.: EnDAS: efficient encrypted data search as a mobile cloud service. IEEE Trans. Emerg. Top. Comput. 3(3), 372–383 (2015)
Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130–137 (1980)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 44–55. IEEE (2000)
Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025–3035 (2014)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)
Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of Rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)
Wu, T.Y., Meng, C., Chen, C.M., Wang, K.H., Pan, J.S.: On the security of a certificateless public key encryption with keyword search. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 191–197. Springer (2017)
Wu, T.Y., Meng, C., Wang, K.H., Chen, C.M., Pan, J.S.: Comments on Islam et al.’s certificateless designated server based public key encryption with keyword search scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 199–205. Springer (2017)
Wu, T.Y., Meng, C., Wang, K.H., Chen, C.M., Pan, J.S.: Comments on recent proposed Cui et al.’s KASE and Lu et al.’s diBEKS schemes. J. Inf. Hiding Multimed. Sig. Process. 9(1), 162–196 (2018)
Wu, T.Y., Meng, F., Chen, C.M., Liu, S., Pan, J.S.: On the security of a certificateless searchable public key encryption scheme. In: International Conference on Genetic and Evolutionary Computing, pp. 113–119. Springer (2016)
Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable ID-based encryption with a designated server. Ann. Telecommun.-annales des télécommunications 69(7–8), 391–402 (2014)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2016)
Acknowledgements
The work of Chien-Ming Chen was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755). The work of Tsu-Yang Wu was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, CM., Zhang, W., Wu, TY., Wang, KH., Wu, J.MT., Pan, JS. (2019). Hierarchical Semantic Approximate Multi-keyword Ranked Search over Encrypted Data. In: Zhao, Y., Wu, TY., Chang, TH., Pan, JS., Jain, L. (eds) Advances in Smart Vehicular Technology, Transportation, Communication and Applications. VTCA 2018. Smart Innovation, Systems and Technologies, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-030-04585-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-04585-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04584-5
Online ISBN: 978-3-030-04585-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)