Multi-client Secure Encrypted Search Using Searching Adversarial Networks

08/07/2019
by   Kai Chen, et al.
0

With the rapid development of cloud computing, searchable encryption for multiple data owners model (multi-owner model) draws much attention as it enables data users to perform searches on encrypted cloud data outsourced by multiple data owners. However, there are still some issues yet to be solved nowadays, such as precise query, fast query, "curse of dimensionality" and flexible system dynamic maintenance. To target these issues, this paper proposes a secure and efficient multi-keyword ranked search over encrypted cloud data for multi-owner model based on searching adversarial networks. Specifically, we exploit searching adversarial networks to achieve optimal pseudo-keyword filling, and obtains the optimal game equilibrium for query precision and privacy protection strength. In order to achieve fast query, maximum likelihood search balanced tree is proposed, which brings the query complexity closer to O(log N). We reduce data dimension with fast index clustering, and enable low-overhead system maintenance based on balanced index forest. In addition, attribute based encryption is used to achieve more secure and convenient key management as well as authorized access control. Compared with previous work, our solution maintains query precision above 95 ensuring adequate privacy protection, significantly improving search efficiency, enabling more flexible system dynamic maintenance, and reducing the overhead on computation and storage.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/07/2019

Multi-owner Secure Encrypted Search Using Searching Adversarial Networks

Searchable symmetric encryption (SSE) for multi-owner model draws much a...
research
08/14/2019

Interpretable Encrypted Searchable Neural Networks

In cloud security, traditional searchable encryption (SE) requires high ...
research
03/15/2021

Achieve Efficient Position-Heap-based Privacy-Preserving Substring-of-Keyword Query over Cloud

The cloud computing technique, which was initially used to mitigate the ...
research
04/23/2020

Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

For better data availability and accessibility while ensuring data secre...
research
10/26/2020

Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model

Identity-based encryption with equality test supporting flexible authori...
research
04/27/2019

A Novel Fuzzy Search Approach over Encrypted Data with Improved Accuracy and Efficiency

As cloud computing becomes prevalent in recent years, more and more ente...
research
04/27/2019

Better Accuracy and Efficiency for Fuzzy Search on Encrypted Data

As cloud computing becomes prevalent in recent years, more and more ente...

Please sign up or login with your details

Forgot password? Click here to reset