privacy-preserving multi-keyword ranked search over encrypted cloud data presenter : 刘 燕

Click here to load reader

Post on 15-Jan-2016

140 views

Category:

Documents

0 download

Embed Size (px)

DESCRIPTION

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕. INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION. INTRODUCTION. coordinate matching - PowerPoint PPT Presentation

TRANSCRIPT

  • Privacy-Preserving Multi-keyword Ranked Searchover Encrypted Cloud Data Presenter

  • INTRODUCTIONPROBLEM FORMULATIONFRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSEPRIVACY-PRESERVING AND EFFICIENT MRSEPERFORMANCE ANALYSISRELATED WORKCONCLUSION

  • INTRODUCTIONcoordinate matching as many matches as possible

    inner product similarity the number of query keywords appearing in a document

    k-nearest neighbor technique

  • PROBLEM FORMULATIONSystem Model

  • PROBLEM FORMULATIONThreat ModelKnown Ciphertext Model only know encrypted dataset C and searchable index IKnown Background Model know encrypted dataset C , searchable index I and some backgrounds on the dataset

  • PROBLEM FORMULATIONDesign Goals

    Multi-keyword Ranked Search

    Privacy-Preserving

    Efciency

  • PROBLEM FORMULATIONNotations

  • PROBLEM FORMULATIONPreliminary on Coordinate Matching a hybrid of conjunctive search and disjunctive search uses the number of query keywords appearing in the document to quantify the similarity of that document to the query

  • FRAMEWORK AND PRIVACY REQUIREMENTSMRSE Framework

  • FRAMEWORK AND PRIVACY REQUIREMENTSPrivacy Requirements for MRSEKeyword Privacy

    Trapdoor Privacy

    Search Pattern

    Access Pattern

  • PRIVACY-PRESERVING AND EFFICIENT MRSEMRSE I: Basic SchemeSecure kNN Computation[d+1]=[d+1]= 1

  • PRIVACY-PRESERVING AND EFFICIENT MRSE S[j]=0 = = + =

    S[j]=1 + = = =

  • PRIVACY-PRESERVING AND EFFICIENT MRSE2) MRSE I Scheme:

  • PRIVACY-PRESERVING AND EFFICIENT MRSE

  • PRIVACY-PRESERVING AND EFFICIENT MRSE

  • PRIVACY-PRESERVING AND EFFICIENT MRSE

  • PRIVACY-PRESERVING AND EFFICIENT MRSEMRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:

  • PRIVACY-PRESERVING AND EFFICIENT MRSE

  • PRIVACY-PRESERVING AND EFFICIENT MRSE2) MRSE II Scheme:

  • PRIVACY-PRESERVING AND EFFICIENT MRSEMRSE III: Privacy-Preserving Scheme1) Scale Analysis Attack:

  • PRIVACY-PRESERVING AND EFFICIENT MRSE

  • PRIVACY-PRESERVING AND EFFICIENT MRSE2) MRSE III Scheme:

  • PERFORMANCE ANALYSISA. Precision and Privacy

  • PERFORMANCE ANALYSISB. Efciency1) Index Construction:

  • PERFORMANCE ANALYSIS2) Trapdoor Generation:

  • PERFORMANCE ANALYSIS3) Query:

  • RELATED WORKSingle Keyword Searchable Encryption

    Boolean Keyword Searchable Encryption

  • CONCLUSIONCoordinate Matching as many matches as possibleInner Product Similarity Basic MRSE Scheme Privacy-Preserving Scheme in Known Ciphertext ModelPrivacy-Preserving Scheme in Known Background Mode

    The End

    Thank You!