Nowadays, cloud providers offer to their clients the possibility of storage of emails and files on the cloud server. To avoid privacy concerns, encryption should be applied to data. Unlike searching plaintext documents by keywords, encrypted documents cannot be retrieved in the same manner. As keyword searches on encrypted data are in demand, this paper describes an effective and efficient technique to support privacy-preserving keyword-based search over encrypted outsourced data. With this technique, encrypted data are first searched with the keyword, support for dynamic operations is then checked, and all relevant data documents are finally sorted based on the number of keywords matching the user query. To evaluate the technique, precision and recall are measured. The results reveal the effectiveness and efficiency of the technique in supporting privacy-preserving keyword-based search over encrypted outsourced data.

An effective and efficient technique for supporting privacy-preserving keyword-based search over encrypted data in clouds / Cuzzocrea, A.; Leung, C. K.; Wodi, B. H.; Sourav, S.; Fadda, E.. - In: PROCEDIA COMPUTER SCIENCE. - ISSN 1877-0509. - 177:(2020), pp. 509-515. (Intervento presentato al convegno 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2020 tenutosi a Madeira (Portugal) nel 2 November 2020 through 5 November 2020) [10.1016/j.procs.2020.10.070].

An effective and efficient technique for supporting privacy-preserving keyword-based search over encrypted data in clouds

Fadda E.
2020

Abstract

Nowadays, cloud providers offer to their clients the possibility of storage of emails and files on the cloud server. To avoid privacy concerns, encryption should be applied to data. Unlike searching plaintext documents by keywords, encrypted documents cannot be retrieved in the same manner. As keyword searches on encrypted data are in demand, this paper describes an effective and efficient technique to support privacy-preserving keyword-based search over encrypted outsourced data. With this technique, encrypted data are first searched with the keyword, support for dynamic operations is then checked, and all relevant data documents are finally sorted based on the number of keywords matching the user query. To evaluate the technique, precision and recall are measured. The results reveal the effectiveness and efficiency of the technique in supporting privacy-preserving keyword-based search over encrypted outsourced data.
2020
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S1877050920323401-main.pdf

accesso aperto

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Creative commons
Dimensione 332.19 kB
Formato Adobe PDF
332.19 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2990677