privacy-preserving multi-keyword ranked search over encrypted cloud data presenter : 刘 燕
DESCRIPTION
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕. INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION. INTRODUCTION. coordinate matching - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/1.jpg)
Privacy-Preserving Multi-keyword Ranked Search
over Encrypted Cloud Data
Presenter :刘 燕
![Page 2: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/2.jpg)
2
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY
REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT
MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION
![Page 3: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/3.jpg)
3
INTRODUCTION
• coordinate matching as many matches as possible
• inner product similarity the number of query keywords appearing in a doc
ument
• k-nearest neighbor technique
![Page 4: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/4.jpg)
4
PROBLEM FORMULATION
System Model
![Page 5: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/5.jpg)
5
PROBLEM FORMULATION
Threat Model Known Ciphertext Model
only know encrypted dataset C and searchable index I
Known Background Model
know encrypted dataset C , searchable index I and some backgrounds on the dataset
![Page 6: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/6.jpg)
6
PROBLEM FORMULATION
Design Goals
Multi-keyword Ranked Search
Privacy-Preserving
Efficiency
![Page 7: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/7.jpg)
7
PROBLEM FORMULATION
Notations
![Page 8: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/8.jpg)
8
PROBLEM FORMULATION
Preliminary on Coordinate Matching a hybrid of conjunctive search and disjunctive
search uses the number of query keywords appearing in
the document to quantify the similarity of that
document to the query
![Page 9: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/9.jpg)
9
FRAMEWORK AND PRIVACY REQUIREMENTS
MRSE Framework
![Page 10: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/10.jpg)
10
FRAMEWORK AND PRIVACY REQUIREMENTS
Privacy Requirements for MRSE Keyword Privacy
Trapdoor Privacy
Search Pattern
Access Pattern
![Page 11: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/11.jpg)
11
PRIVACY-PRESERVING AND EFFICIENT MRSE
A. MRSE I: Basic Scheme
1) Secure kNN Computation
[d+1]=
[d+1]= 1
![Page 12: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/12.jpg)
12
PRIVACY-PRESERVING AND EFFICIENT MRSE
S[j]=0 = =
+ =
S[j]=1 + =
= =
![Page 13: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/13.jpg)
13
PRIVACY-PRESERVING AND EFFICIENT MRSE
2) MRSE I Scheme:
![Page 14: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/14.jpg)
14
PRIVACY-PRESERVING AND EFFICIENT MRSE
![Page 15: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/15.jpg)
15
PRIVACY-PRESERVING AND EFFICIENT MRSE
![Page 16: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/16.jpg)
16
PRIVACY-PRESERVING AND EFFICIENT MRSE
![Page 17: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/17.jpg)
17
PRIVACY-PRESERVING AND EFFICIENT MRSE
MRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:
![Page 18: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/18.jpg)
18
PRIVACY-PRESERVING AND EFFICIENT MRSE
![Page 19: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/19.jpg)
19
PRIVACY-PRESERVING AND EFFICIENT MRSE
2) MRSE II Scheme:
![Page 20: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/20.jpg)
20
PRIVACY-PRESERVING AND EFFICIENT MRSE
MRSE III: Privacy-Preserving Scheme1) Scale Analysis Attack:
![Page 21: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/21.jpg)
21
PRIVACY-PRESERVING AND EFFICIENT MRSE
![Page 22: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/22.jpg)
22
PRIVACY-PRESERVING AND EFFICIENT MRSE
2) MRSE III Scheme:
![Page 23: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/23.jpg)
23
PERFORMANCE ANALYSIS
A. Precision and Privacy
![Page 24: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/24.jpg)
24
PERFORMANCE ANALYSIS
B. Efficiency1) Index Construction:
![Page 25: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/25.jpg)
25
PERFORMANCE ANALYSIS
2) Trapdoor Generation:
![Page 26: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/26.jpg)
26
PERFORMANCE ANALYSIS
3) Query:
![Page 27: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/27.jpg)
27
RELATED WORK
• Single Keyword Searchable Encryption
• Boolean Keyword Searchable Encryption
![Page 28: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/28.jpg)
28
CONCLUSION
• Coordinate Matching
as many matches as possible
• Inner Product Similarity
• Basic MRSE Scheme
• Privacy-Preserving Scheme in Known Ciphertext Model
• Privacy-Preserving Scheme in Known
Background Mode
![Page 29: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕](https://reader036.vdocuments.net/reader036/viewer/2022081418/568149df550346895db70599/html5/thumbnails/29.jpg)
29
The End
Thank You!