期刊文献+

基于多边缘服务器的个性化搜索隐私保护方法 被引量:2

Method of privacy protection based on multiple edge servers in personalized search
下载PDF
导出
摘要 在明文环境下根据用户的兴趣模型以及查询关键词能够获得用户个性化的搜索结果会导致敏感数据和用户隐私信息的泄露,不利于含有敏感数据的云搜索服务的推广,鉴于此,数据通常以密文的形式存储在云服务器中。用户在使用云搜索服务时,希望在海量的密文中快速地获得自己想要的搜索结果。为了解决这一问题,在个性化搜索中提出了一种基于多边缘服务器的隐私保护方法,该方法通过引入多个边缘服务器,并通过切割索引与查询矩阵,实现了在边缘服务器上计算部分用户查询与部分文件索引之间的相关性得分,云服务器只需要将边缘服务器上得到的相关性得分做简单处理即能返回与用户查询最相关的前K个文件,使其特别适用于大量用户在海量密文中的个性化搜索。安全分析和实验结果表明,该方法能很好地保护用户的隐私以及数据的机密性,并具有高效的搜索效率,能为用户提供了更好的个性化搜索体验。 In the plaintext environment,users'personalized search results can be obtained through users'interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.
作者 张强 王国军 张少波 ZHANG Qiang;WANG Guojun;ZHANG Shaobo(School of Information Science and Engineering,Central South University,Changsha 410083,China;School of Computer Science and Cyber Engineering,Guangzhou University,Guangzhou 510006,China;School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,China)
出处 《通信学报》 EI CSCD 北大核心 2019年第2期40-50,共11页 Journal on Communications
基金 国家自然科学基金资助项目(No.61632009 No.61472451) 广东省自然科学基金资助项目(No.2017A030308006) 广东省高等教育高层次人才计划基金资助项目(No.2016ZJ01) 中南大学中央高校基本科研业务费专项基金资助项目(No.2017zzts141)~~
关键词 个性化搜索 隐私保护 边缘服务器 索引切割 可搜索加密 personalized search privacy protection edge server index cutting searchable encryption
  • 相关文献

参考文献3

二级参考文献51

  • 1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445].
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0].
  • 3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958].
  • 4Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216.
  • 5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30].
  • 6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88.
  • 7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7].
  • 8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298].
  • 9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122].
  • 10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3].

共引文献90

同被引文献11

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部