• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Li, Jiayi (Li, Jiayi.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Miao, Yinbin (Miao, Yinbin.) [3] | Yang, Ruikang (Yang, Ruikang.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [6]

Indexed by:

EI

Abstract:

With the explosive growth of data volume in the cloud computing environment, data owners are increasingly inclined to store their data on the cloud. Although data outsourcing reduces computation and storage costs for them, it inevitably brings new security and privacy concerns, as the data owners lose direct control of sensitive data. Meanwhile, most of the existing ranked keyword search schemes mainly focus on enriching search efficiency or functionality, but lack of providing efficient access control and formal security analysis simultaneously. To address these limitations, in this article we propose an efficient and privacy-preserving Multi-keyword Ranked Search scheme with Fine-grained access control (MRSF). MRSF can realize highly accurate ciphertext retrieval by combining coordinate matching with Term Frequency-Inverse Document Frequency (TF-IDF) and improving the secure κNN method. Besides, it can effectively refine users' search privileges by utilizing the polynomial-based access strategy. Formal security analysis shows that MRSF is secure in terms of confidentiality of outsourced data and the privacy of index and tokens. Extensive experiments further show that, compared with existing schemes, MRSF achieves higher search accuracy and more functionalities efficiently. © 2013 IEEE.

Keyword:

Access control Cloud storage Inverse problems Privacy-preserving techniques Search engines Security systems Sensitive data

Community:

  • [ 1 ] [Li, Jiayi]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Li, Jiayi]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi, Guilin; 541004, China
  • [ 3 ] [Ma, Jianfeng]Xidian University, School of Cyber Engineering, The Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 4 ] [Miao, Yinbin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 5 ] [Miao, Yinbin]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi, Guilin; 541004, China
  • [ 6 ] [Yang, Ruikang]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 7 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Key Laboratory of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 8 ] [Choo, Kim-Kwang Raymond]University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Cloud Computing

Year: 2022

Issue: 3

Volume: 10

Page: 2005-2019

6 . 5

JCR@2022

5 . 3 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 24

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:230/10830542
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1