Exploring the similarity space
ACM SIGIR Forum
Journal of the ACM (JACM)
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Journal of Complexity - Special issue on coding and cryptography
RCV1: A New Benchmark Collection for Text Categorization Research
The Journal of Machine Learning Research
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Introduction to Information Retrieval
Introduction to Information Retrieval
A break in the clouds: towards a cloud definition
ACM SIGCOMM Computer Communication Review
Information Security Applications
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02
Public key encryption that allows PIR queries
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Secure Ranked Keyword Search over Encrypted Cloud Data
ICDCS '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
First CPIR protocol with data-dependent computation
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
An efficient public key encryption with conjunctive-subset keywords search
Journal of Network and Computer Applications
Efficient computationally private information retrieval from anonymity or trapdoor groups
ISC'10 Proceedings of the 13th international conference on Information security
Privacy preserving keyword searches on remote encrypted data
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Keyword search and oblivious pseudorandom functions
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Multi-query computationally-private information retrieval with constant communication rate
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Efficient Similarity Search over Encrypted Data
ICDE '12 Proceedings of the 2012 IEEE 28th International Conference on Data Engineering
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Efficient and secure ranked multi-keyword search on encrypted cloud data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Hi-index | 0.00 |
Information search and retrieval from a remote database (e.g., cloud server) involves a multitude of privacy issues. Submitted search terms and their frequencies, returned responses and order of their relevance, and retrieved data items may contain sensitive information about the users. In this paper, we propose an efficient multi-keyword search scheme that ensures users' privacy against both external adversaries including other authorized users and cloud server itself. The proposed scheme uses cryptographic techniques as well as query and response randomization. Provided that the security and randomization parameters are appropriately chosen, both search terms in queries and returned responses are protected against privacy violations. The scheme implements strict security and privacy requirements that essentially disallow linking queries featuring identical search terms. We also incorporate an effective ranking capability in the scheme that enables user to retrieve only the top matching results. Our comprehensive analytical study and extensive experiments using both real and synthetic datasets demonstrate that the proposed scheme is privacy-preserving, effective, and highly efficient.