Abstract:In order to solve the problems such as high dimension of encrypted key,low degree of update flexibility and low search speed in the field of encrypted search,we propose a novel classificatory group index method-CGIM.The method extracts category keywords from classified data to create group index,and uses group encryption method to transform a high-dimensional secret key into several low-dimensional keys to reduce the encryption time of indexes and query requests.In addition,each group in the index is corresponding to different category.Thus,the method can not only achieve classification update to improve the flexibility of document update,but also can generate a targeted trapdoor in the retrieval process to improve the search speed and efficiency further.Through security analysis and performance test,we prove that the method is feasible and effective.
[1] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
[2] Heiser J,Nicolett M.Assessing the security risks of cloud computing[J].Gartner Report,2008,27:29-52.
[3] 王小峰,陈培鑫,周寰,等.一种可信安全的层次式基于身份加密系统[J].电子学报,2016,44(7):1521-1529. WANG Xiaofeng,CHEN Peixin,ZHOU Huan,et al.A trustworthy and secure hierarchical identity-based encryption system[J].Acta Electronica Sinica,2016,44(7):1521-1529.(in Chinese)
[4] Wang C,Ren K,Yu S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[A].INFOCOM,2012 Proceedings IEEE[C].Orlando,FL,USA:IEEE,2012.451-459.
[5] Sanchez D,Batet M,Isern D,et al.Ontology-based semantic similarity:A new feature-based approach[J].Expert Systems with Applications,2012,39(9):7718-7728.
[6] Desai S S,Laxminarayana J A.WordNet and semantic similarity based approach for document clustering[A].Computation System and Information Technology for Sustainable Solutions(CSITSS),International Conference on[C].Bangalore,India:IEEE,2016.312-317.
[7] Li M,Yu S,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing[A].Distributed Computing Systems(ICDCS),201131st International Conference on[C].Minneapolis,MN,USA:IEEE,2011.383-392.
[8] 袁科,刘哲理,贾春福,等.一对多场景下的公钥时控性可搜索加密[J].电子学报,2015,43(4):760-768. YUAN Ke,Liu Zheli,JIA Chunfu,et al.Public key timed-release searchable encryption in one-to-many scenarios[J].Acta Electronica Sinica,2015,43(4):760-768.(in Chinese)
[9] Fu Z,Sun X,Linge N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.
[10] Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[A].Distributed Computing Systems(ICDCS),2010 IEEE 30th International Conference on[C].Genova,Italy:IEEE,2010.253-262.
[11] 杨旸,杨书略,柯闽.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444. YANG Yang,YANG Shulue,KE Min.Ranked fuzzy keyword search based on simhash over encrypted cloud data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)
[12] Cao N,Wang C,Li M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233.
[13] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[A].Security and Privacy,2000,S&P 2000,Proceedings,2000 IEEE Symposium on[C].Berkeley,CA,USA:IEEE,2000.44-55.
[14] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[A].INFOCOM,2010 Proceedings IEEE[C].San Diego,CA,USA:IEEE,2010.1-5.
[15] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934.
[16] Fu Z,Ren K,Shu J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.
[17] Zhang W,Lin Y,Xiao S,et al.Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing[J].IEEE Transactions on Computers,2016,65(5):1566-1577.
[18] Wang J,Chen X,Ma H,et al.A verifiable fuzzy keyword search scheme over encrypted data[J].J Internet Serv Inf Secur,2012,2(1/2):49-58.
[19] Xia Z,Wang X,Sun X,et al.A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.
[20] Internet Society.Request for Comments[EB/OL].http://www.ietf.org/rfc.html,1969-04-07/2017-12-17.