Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services
Mohanad Dawoud, D. Turgay Altilar
2016
Abstract
Recently, cloud computing became an essential part of most IT strategies. However, security and privacy issues are still the two main concerns that limit the widespread use of cloud services since the data is stored in unknown locations and retrieval of data (or part of it) may involve disclosure of sensitive data to unauthorized parties. Many techniques have been proposed to handle this problem, which is known as Privacy-Preserving Data Retrieval (PPDR). These techniques attempt to minimize the sensitive data that needs to be revealed. However, revealing any data to an unauthorized party breaks the security and privacy concepts and also may decrease the efficiency of the data retrieval. In this paper, different requirements are defined to satisfy a high level of security and privacy in a PPDR system. Moreover, a technique that uses anonymous query authentication and multi-server settings is proposed. The technique provides an efficient ranking-based data retrieval by using weighted Term Frequency-Inverse Document Frequency (TF-IDF) vectors. It also satisfies all of the defined security requirements that were completely unsatisfied by the techniques reported in the literature.
References
- Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword search. In Cachin, C. and Camenisch, J., editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer Berlin Heidelberg.
- Cao, N., Wang, C., Li, M., Ren, K., and Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In INFOCOM, 2011 Proceedings IEEE, pages 829-837.
- Chen, L., Sun, X., Xia, Z., and Liu, Q. (2014). An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data. International Journal of Security and Its Applications, 8(2):323-332.
- ChinnaSamy, R. and Sujatha, S. (2012). An efficient semantic secure keyword based search scheme in cloud storage services. In Recent Trends In Information Technology (ICRTIT), 2012 International Conference on, pages 488-491.
- Chuah, M. and Hu, W. (2011). Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, pages 273-281.
- Dawoud, M. and Altilar, D. (2014). Privacy-preserving search in data clouds using normalized homomorphic encryption. In Euro-Par 2014: Parallel Processing Workshops, volume 8806 of Lecture Notes in Computer Science, pages 62-72. Springer International Publishing.
- Gopal, G. and Singh, M. (2012). Secure similarity based document retrieval system in cloud. In Data Science Engineering (ICDSE), 2012 International Conference on, pages 154-159.
- Hammouda, k. (2013). Web mining data - uw-can-dataset. http://pami.uwaterloo.ca/ hammouda/webdata.
- Kuzu, M., Islam, M. S., and Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, ICDE 7812, pages 1156- 1167, Washington, DC, USA. IEEE Computer Society.
- Lang, K. (1995). Newsweeder: Learning to filter netnews. In Proceedings of the Twelfth International Conference on Machine Learning, pages 331-339.
- Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., and Lou, W. (2010). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-5.
- Li, M., Yu, S., Cao, N., and Lou, W. (2011). Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383-392.
- Liu, Q., Wang, G., and Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE 7809. International Conference on, volume 2, pages 715-720.
- Orencik, C. and Savas, E. (2014). An efficient privacypreserving multi-keyword search over encrypted cloud data with ranking. Distributed and Parallel Databases, 32(1):119-160.
- Rajaraman, A. and Ullman, J. D. (2011). Data mining. In Mining of Massive Datasets, pages 1-17. Cambridge University Press. Cambridge Books Online.
- Salton, G. and Buckley, C. (1988a). Term-weighting approaches in automatic text retrieval. In Information Processing and Management, pages 513-523.
- Salton, G. and Buckley, C. (1988b). Term-weighting approaches in automatic text retrieval. Inf. Process. Manage., 24(5):513-523.
- Song, D. X., Wagner, D., and Perrig, A. (2000). Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE Symposium on, pages 44-55.
- Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., and Li, H. (2013). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 7813, pages 71-82, New York, NY, USA. ACM.
- Tseng, F.-K., Liu, Y.-H., and Chen, R.-J. (2012). Toward authenticated and complete query results from cloud storages. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pages 1204-1209.
- Volkan, T. (2012). Data mining research - classic3 and classic4 datasets. http://www.dataminingresearch.com/index.php/2010/ 09/classic3-classic4-datasets.
- Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on, pages 253-262.
- Wang, C., Cao, N., Ren, K., and Lou, W. (2012a). Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8):1467-1479.
- Wang, C., Ren, K., Yu, S., and Urs, K. (2012b). Achieving usable and privacy-assured similarity search over outsourced cloud data. In INFOCOM, 2012 Proceedings IEEE, pages 451-459.
- Xiang, G., Yu, B., and Zhu, P. (2012). A algorithm of fully homomorphic encryption. In Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on, pages 2030-2033.
Paper Citation
in Harvard Style
Dawoud M. and Altilar D. (2016). Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services . In Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER, ISBN 978-989-758-182-3, pages 171-180. DOI: 10.5220/0005758601710180
in Bibtex Style
@conference{closer16,
author={Mohanad Dawoud and D. Turgay Altilar},
title={Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services},
booktitle={Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER,},
year={2016},
pages={171-180},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005758601710180},
isbn={978-989-758-182-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 6th International Conference on Cloud Computing and Services Science - Volume 2: CLOSER,
TI - Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services
SN - 978-989-758-182-3
AU - Dawoud M.
AU - Altilar D.
PY - 2016
SP - 171
EP - 180
DO - 10.5220/0005758601710180