2017
DOI: 10.1155/2017/1923476
|View full text |Cite
|
Sign up to set email alerts
|

MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data

Abstract: With the development of cloud computing, services outsourcing in clouds has become a popular business model. However, due to the fact that data storage and computing are completely outsourced to the cloud service provider, sensitive data of data owners is exposed, which could bring serious privacy disclosure. In addition, some unexpected events, such as software bugs and hardware failure, could cause incomplete or incorrect results returned from clouds. In this paper, we propose an efficient and accurate verif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Xia et al [11] proposed a secure and dynamic multi-keyword ranked search scheme by adopting a balanced binary tree index. Chen et al [13] and Zhu et al [12] proposed two different privacy-preserving ranked search schemes, which both utilize clustering algorithm to improve search efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Xia et al [11] proposed a secure and dynamic multi-keyword ranked search scheme by adopting a balanced binary tree index. Chen et al [13] and Zhu et al [12] proposed two different privacy-preserving ranked search schemes, which both utilize clustering algorithm to improve search efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…In this model, Pub-Cloud is assumed to have more knowledge than the known ciphertext threat model, such as the keyword frequency statistics of document collection. The statistical information reveals the quantity of documents of specific keywords in D, which could be used by Pub-Cloud to apply TF statistical attacks and hence infer or even recognize certain keywords through analyzing the histogram or value range of the corresponding frequency distributions [11], [12], [29].…”
Section: Problem Descriptionmentioning
confidence: 99%
“…Moreover, the data owner can share their data with a large number of users which requires the cloud server to have the ability to meet a large amount of requests with effective data retrieval services. One effective method for solving this problem is ranking the results and sending back the top-K files to the data user, rather than all of the relevant files [14]. This method can dramatically reduce the communication overhead and still meet user's demand.…”
Section: Introductionmentioning
confidence: 99%
“…To encrypt the index of HAC tree and query vector, this method uses the secure inner product algorithm. In this, Non-candidate Pruning Depth First Algorithm is used to search the corresponding file in the tree which prunes the sub-tree which does not contain any search result [2]. To increase the relevance of the searched keyword to the cloud file, the coordinate matching along with inner product similarity is introduced.…”
Section: Introductionmentioning
confidence: 99%