ACKNOWLEDGEMENTS
This work was supported by Turk Telekom under
Grant Number 3014-02.
REFERENCES
A¨ımeur, E., Brassard, G., Fernandez, J., and Mani (2008).
Alambic : a privacy-preserving recommender system
for electronic commerce. International Journal of In-
formation Security, 7(5):307–334.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz,
R. H., Konwinski, A., Lee, G., Patterson, D. A.,
Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above
the clouds: A berkeley view of cloud computing.
Technical Report UCB/EECS-2009-28, EECS De-
partment, University of California, Berkeley.
Ballard, L., Kamara, S., and Monrose, F. (2005). Achieving
efficient conjunctive keyword searches over encrypted
data. Springer, 3873:414–426.
Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
searchs. In proceedings of Eurocrypt 2004, LNCS
3027, pages 506–522.
Boneh, D. and Waters, B. (2007). Conjunctive, Subset, and
Range Queries on Encrypted Data. In Theory of Cryp-
tography, volume 4392 of Lecture Notes in Computer
Science, pages 535–554. Springer Berlin / Heidelberg.
Cao, N., Wang, C., Li, M., Ren, K., and Lou, W. (2011).
Privacy-preserving multi-keyword ranked search over
encrypted cloud data. In IEEE INFOCOM.
Ceselli, A., Damiani, E., Vimercati, S. D. C. D., Jajodia, S.,
Paraboschi, S., and Samarati, P. (2005). Modeling and
assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 8:119–152.
el Diehn, D., Abou-Tair, I., K¨oster, I., and H¨ofke, K. (2011).
Security and privacy requirements in interactive tv.
Multimedia Systems, 17:393–408.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. In Proceedings of the 14th international con-
ference on Financial cryptography and data security,
FC’10, pages 136–149. Springer-Verlag.
Kodialam, M., Lakshman, T., Mukherjee, S., and Wang, L.
(2010). Online scheduling of targeted advertisements
for iptv. INFOCOM, 2010 Proceedings IEE, pages 1–
9.
Min, W. H. and Cheong, Y. G. (2009). An interactive-
content technique based approach to generating per-
sonalized advertisement for privacy protection. In
HCI (9), pages 185–191.
¨
Orencik, C. and Savas¸, E. (2012). Efficient and se-
cure ranked multi-keyword search on encrypted cloud
data. http://www.edbt.org/Proceedings/2012-Berlin/
papers/workshops/pais2012/a5-orencik.pdf. retrieved
on May 14, 2012.
Shen, E., Shi, E., and Waters, B. (2009). Predicate Privacy
in Encryption Systems. In TCC ’09: Proceedings of
the 6th Theory of Cryptography Conference on Theory
of Cryptography, pages 457–473. Springer-Verlag.
Sweeney, L. (2002). K-Anonymity: a model for protect-
ing privacy. Int. J. Uncertain. Fuzziness Knowl.-Based
Syst, 10:557–570.
Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010).
Secure ranked keyword search over encrypted cloud
data. In ICDCS’10, pages 253–262.
Wang, P., Wang, H., and Pieprzyk, J. (2009). An effi-
cient scheme of common secure indices for conjunc-
tive keyword-based retrieval on encrypted data. In
Chung, K.-I., Sohn, K., and Yung, M., editors, Infor-
mation Security Applications, volume 5379 of LNCS,
pages 145–159. Springer Berlin / Heidelberg.
APPENDIX
Trapdoor Non-transferability Protocol
This protocol is designed to prevent authorized adver-
tisers selling their trapdoorsto each other. Public keys
of the participants:
PU
X
- public key of the party X
PR
X
- private key of the party X
Assume that an advertiser (ADV) purchases the fol-
lowing trapdoors (I
1
, I
2
, . . . , I
t
) corresponding to the
keywords (w
1
, w
2
, . . . , w
t
)
IPTV performs the following steps:
1. Computes I = ⊙
t
i=1
I
i
.
2. Generates the signature for the sold trapdoors
S = SIGN
PR
IPTV
(I, PU
ADV
) .
3. Sends (S, I) to ADV.
The ADV validates the signature S. For a query that
involves the keywords {w
1
, w
2
, . . . , w
δ
}, the ADV and
the CS execute the following protocol steps:
1. ADV compute I
q
= ⊙
δ
i=1
I
i
.
2. ADV sends (I, S), and I
q
to CS.
3. CS continues if the signature is verified.
4. For I = j
r−1
. . . j
0
and I
q
= q
r−1
. . . q
0
CS checks
∀i ∈ [0, . . . , r− 1], q
i
= 0 ⇒ j
i
= 0.
If I
q
matches with I, meaning that ADV is autho-
rized to ask such query, otherwise it aborts.
5. CS performs the query and generates a response
R, which includes the list of ids matching the
predicates in the query.
6. CS selects a symmetric key k and performs
the following encryptions ENC
PU
ADV
(k) and
ENC
k
(R). Next he sends ciphertexts to ADV.
7. ADV decrypts ENC
PU
ADV
(k) with its private key
and obtains k. Knowing the symmetric key, the
advertiser can obtain the response.
Privacy-preservingTargetedAdvertisingSchemeforIPTVusingtheCloud
83