基于多边缘服务器的个性化搜索隐私保护方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Method of privacy protection based on multiple edge servers in personalized search
  • 作者:张强 ; 王国军 ; 张少波
  • 英文作者:ZHANG Qiang;WANG Guojun;ZHANG Shaobo;School of Information Science and Engineering, Central South University;School of Computer Science and Cyber Engineering, Guangzhou University;School of Computer Science and Engineering, Hunan University of Science and Technology;
  • 关键词:个性化搜索 ; 隐私保护 ; 边缘服务器 ; 索引切割 ; 可搜索加密
  • 英文关键词:personalized search;;privacy protection;;edge server;;index cutting;;searchable encryption
  • 中文刊名:TXXB
  • 英文刊名:Journal on Communications
  • 机构:中南大学信息科学与工程学院;广州大学计算机科学与网络工程学院;湖南科技大学计算机科学与工程学院;
  • 出版日期:2019-02-25
  • 出版单位:通信学报
  • 年:2019
  • 期:v.40;No.382
  • 基金:国家自然科学基金资助项目(No.61632009,No.61472451);; 广东省自然科学基金资助项目(No.2017A030308006);; 广东省高等教育高层次人才计划基金资助项目(No.2016ZJ01);; 中南大学中央高校基本科研业务费专项基金资助项目(No.2017zzts141)~~
  • 语种:中文;
  • 页:TXXB201902006
  • 页数:11
  • CN:02
  • ISSN:11-2102/TN
  • 分类号:44-54
摘要
在明文环境下根据用户的兴趣模型以及查询关键词能够获得用户个性化的搜索结果会导致敏感数据和用户隐私信息的泄露,不利于含有敏感数据的云搜索服务的推广,鉴于此,数据通常以密文的形式存储在云服务器中。用户在使用云搜索服务时,希望在海量的密文中快速地获得自己想要的搜索结果。为了解决这一问题,在个性化搜索中提出了一种基于多边缘服务器的隐私保护方法,该方法通过引入多个边缘服务器,并通过切割索引与查询矩阵,实现了在边缘服务器上计算部分用户查询与部分文件索引之间的相关性得分,云服务器只需要将边缘服务器上得到的相关性得分做简单处理即能返回与用户查询最相关的前K个文件,使其特别适用于大量用户在海量密文中的个性化搜索。安全分析和实验结果表明,该方法能很好地保护用户的隐私以及数据的机密性,并具有高效的搜索效率,能为用户提供了更好的个性化搜索体验。
        In the plaintext environment, users' personalized search results can be obtained through users' interest modeland query keywords. However, it may possibly result in the disclosure of sensitive data and privacy, which prevents usingsensitive data in cloud search. Therefore, data is generally stored in the form of ciphertext in the cloud server. In theprocess of cloud search service, users intend to quickly obtain the desired search results from the vast amount of cipher-text. In order to solve the problem, it was proposed that a method of privacy protection based on multiple edge servers inpersonalized search shall be used. By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server. The cloud serveronly needs to get the relevance score on the edge server and make a simple processing that can return to the most relevantTop K files by user query, so as to make it particularly suitable for a large number of users in the massive personalizedciphertext search. Security analysis and experimental results show that this method can effectively protect users' privacyand data confidentiality. In addition, it can guarantee high efficiency in search to provide better personalized search expe-rience.
引文
[1]TANG J,CUI Y,LI Q,et al.Ensuring security and privacy preservation for cloud data services[J].Acm Computing Surveys,2016,49(1):1-39.
    [2]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//IEEE Symposium on Security&Privacy.2002:44-55.
    [3]LI H W,LIU D X,DAI Y S,et al.Engineering searchable encryption of mobile cloud networks:when QoE meets QoP[J].IEEE Wireless Communications,2015,22(4):74-80.
    [4]CHANG Y C,MITZENMACHER M.Privacy preserving keyword searches on remote encrypted data[C]//International Conference on Applied Cryptography and Network Security.2005:442-455.
    [5]CURTMOLA R,GARAY J,KAMARA S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934.
    [6]DAN B,CRESCENZO G D,OSTROVSKY R,et al.Public key encryption with keyword search[C]//International Conference on the Theory and Applications of Cryptographic Techniques.2004:506-522.
    [7]李经纬,贾春福,刘哲理,等.可搜索加密技术研究综述[J].软件学报,2015,26(1):109-128.LI J W,JIA C F,LIU Z L,et al.Survey on the searchable encryption[J].Journal of Software,2015,26(1):109-128.
    [8]CUI J,ZHOU H,ZHONG H,et al.AKSER:attribute-based keyword search with efficient revocation in cloud computing[J].Information Sciences,2017,423:343-352.
    [9]ZHAO F,YAN F W,JIN H,et al.Personalized mobile searching approach based on combining content-based filtering and collaborative filtering[J].IEEE Systems Journal,2017,11(1):324-332.
    [10]LEUNG W T,LEE D L,LEE W C.PMSE:a personalized mobile search engine[J].IEEE Transactions on Knowledge&Data Engineering,2013,25(4):820-834.
    [11]FU Z J,REN K,SHU J G,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel&Distributed Systems,2016,27(9):2546-2559.
    [12]FU Z J,WU X L,WANG Q,et al.Enabling central keyword-based semantic extension search over encrypted outsourced data[J].IEEE Transactions on Information Forensics&Security,2017,12(12):2986-2997.
    [13]ALHABASHNEH O,IQBAL R,DOCTOR F,et al.Fuzzy rule based profiling approach for enterprise information seeking and retrieval[J].Information Sciences,2017,394-395:18-37.
    [14]ZHANG Q,WANG G J,LIU Q.Enabling cooperative privacy-preserving personalized search in cloud environments[J].Information Sciences,2019,480:1-13.
    [15]WONG W K,CHEUNG W L,KAO B,et al.Secure kNN computation on encrypted databases[C]//ACM SIGMOD International Conference on Management of Data.2009:139-152.
    [16]张强,王国军.个性化搜索中一种基于位置服务的隐私保护方法[J].电子与信息学报,2018,40(8):1998-2005.ZHANG Q,WANG G J.Privacy preserving method based on location service in personalized search[J].Journal of Electronics&Information Technology,2018,40(8):1998-2005.
    [17]DU Q,XIE H R,CAI Y,et al.Folksonomy-based personalized search by hybrid user profiles in multiple levels[J].Neurocomputing,2016,204(C):142-152.
    [18]MILLER G A.WordNet:a lexical database for english[C]//Communications of the ACM.1995,2(11):39-41.
    [19]D’ORAZIO C J,CHOO K K R.A technique to circumvent SSL/TLSvalidations on iOS devices[J].Future Generation Computer Systems,2017,74:366-374.
    [20]OPPLIGER R,HAUSER R,BASIN D.SSL/TLS session-aware user authentication[J].Computers&Security,2008,27(3-4):64-70.
    [21]LUO E T,LIU Q,ABAWAJY J H,et al.Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks[J].Future Generation Computer Systems,2017,68:222-233.
    [22]ZHANG Q,LIU Q,WANG G J.PRMS:A personalized mobile search over encrypted outsourced data[J].IEEE Access,2018,6:31541-31552.
    [23]吴志强,李肯立,郑蕙.高效可扩展的对称密文检索架构[J].通信学报,2017,38(8):79-93.WU Z Q,LI K L,ZHENG H.Efficient and scalable architecture for searchable symmetric encryption[J].Journal on Communications,2017,38(8):79-93.
    [24]GOSMAN C,CORNEA T,DOBRE C,et al.Controlling and filtering users data in intelligent transportation system[J].Future Generation Computer Systems,2016,78:807-816.
    [25]WANG T,LI Y,CHEN Y,et al.Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J].IEEE Communications Letters,2017,21(11):2532-2535.
    [26]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel&Distributed systems,2014,25(1):222-233.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700