Transcript
Page 1: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

Privacy-Preserving Multi-keyword Ranked Search

over Encrypted Cloud Data

Presenter :刘 燕

Page 2: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

2

INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY

REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT

MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION

Page 3: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

3

INTRODUCTION

• coordinate matching as many matches as possible

• inner product similarity the number of query keywords appearing in a doc

ument

• k-nearest neighbor technique

Page 4: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

4

PROBLEM FORMULATION

System Model

Page 5: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

5

PROBLEM FORMULATION

Threat Model Known Ciphertext Model

only know encrypted dataset C and searchable index I

Known Background Model

know encrypted dataset C , searchable index I and some backgrounds on the dataset

Page 6: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

6

PROBLEM FORMULATION

Design Goals

Multi-keyword Ranked Search

Privacy-Preserving

Efficiency

Page 7: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

7

PROBLEM FORMULATION

Notations

Page 8: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

8

PROBLEM FORMULATION

Preliminary on Coordinate Matching a hybrid of conjunctive search and disjunctive

search uses the number of query keywords appearing in

the document to quantify the similarity of that

document to the query

Page 9: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

9

FRAMEWORK AND PRIVACY REQUIREMENTS

MRSE Framework

Page 10: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

10

FRAMEWORK AND PRIVACY REQUIREMENTS

Privacy Requirements for MRSE Keyword Privacy

Trapdoor Privacy

Search Pattern

Access Pattern

Page 11: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

11

PRIVACY-PRESERVING AND EFFICIENT MRSE

A. MRSE I: Basic Scheme

1) Secure kNN Computation

[d+1]=

[d+1]= 1

Page 12: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

12

PRIVACY-PRESERVING AND EFFICIENT MRSE

S[j]=0 = =

+ =

S[j]=1 + =

= =

Page 13: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

13

PRIVACY-PRESERVING AND EFFICIENT MRSE

2) MRSE I Scheme:

Page 14: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

14

PRIVACY-PRESERVING AND EFFICIENT MRSE

Page 15: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

15

PRIVACY-PRESERVING AND EFFICIENT MRSE

Page 16: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

16

PRIVACY-PRESERVING AND EFFICIENT MRSE

Page 17: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

17

PRIVACY-PRESERVING AND EFFICIENT MRSE

MRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:

Page 18: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

18

PRIVACY-PRESERVING AND EFFICIENT MRSE

Page 19: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

19

PRIVACY-PRESERVING AND EFFICIENT MRSE

2) MRSE II Scheme:

Page 20: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

20

PRIVACY-PRESERVING AND EFFICIENT MRSE

MRSE III: Privacy-Preserving Scheme1) Scale Analysis Attack:

Page 21: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

21

PRIVACY-PRESERVING AND EFFICIENT MRSE

Page 22: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

22

PRIVACY-PRESERVING AND EFFICIENT MRSE

2) MRSE III Scheme:

Page 23: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

23

PERFORMANCE ANALYSIS

A. Precision and Privacy

Page 24: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

24

PERFORMANCE ANALYSIS

B. Efficiency1) Index Construction:

Page 25: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

25

PERFORMANCE ANALYSIS

2) Trapdoor Generation:

Page 26: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

26

PERFORMANCE ANALYSIS

3) Query:

Page 27: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

27

RELATED WORK

• Single Keyword Searchable Encryption

• Boolean Keyword Searchable Encryption

Page 28: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

28

CONCLUSION

• Coordinate Matching

as many matches as possible

• Inner Product Similarity

• Basic MRSE Scheme

• Privacy-Preserving Scheme in Known Ciphertext Model

• Privacy-Preserving Scheme in Known

Background Mode

Page 29: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter  : 刘 燕

29

The End

Thank You!


Top Related