TY - GEN
T1 - ESAS
T2 - 2019 International Conference on Computing, Networking and Communications, ICNC 2019
AU - Liu, Xueyan
AU - Guan, Zhitao
AU - Du, Xiaojiang
AU - Zhu, Liehuang
AU - Yu, Zhengtao
AU - Ma, Yinglong
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/4/8
Y1 - 2019/4/8
N2 - Nowadays, a large amount of user privacy-sensitive data is outsourced to the cloud server in ciphertext, which is provided by the data owners and can be accessed by authorized data users. When accessing data, the user should be assigned with the access permission according to his identities or attributes. In addition, the search capabilities in encrypted out-sourced data is expected to be enhanced, i.e., the search results can better present user's intentions. To address the above issues, ESAS, an Efficient Semantic and Authorized Search scheme over encrypted outsourced data, is proposed. In ESAS, by integrating PRSCG (the privacy-preserving ranked search based on conceptual graph) and CP-ABE (ciphertext policy attribute-based encryption), semantic search with file-level fine-grained access authorization can be realized. In addition, search authorization can be done in an offline manner, which can improve search efficiency and reduce the response time. The security analysis indicate that the proposed ESAS meets security requirement.
AB - Nowadays, a large amount of user privacy-sensitive data is outsourced to the cloud server in ciphertext, which is provided by the data owners and can be accessed by authorized data users. When accessing data, the user should be assigned with the access permission according to his identities or attributes. In addition, the search capabilities in encrypted out-sourced data is expected to be enhanced, i.e., the search results can better present user's intentions. To address the above issues, ESAS, an Efficient Semantic and Authorized Search scheme over encrypted outsourced data, is proposed. In ESAS, by integrating PRSCG (the privacy-preserving ranked search based on conceptual graph) and CP-ABE (ciphertext policy attribute-based encryption), semantic search with file-level fine-grained access authorization can be realized. In addition, search authorization can be done in an offline manner, which can improve search efficiency and reduce the response time. The security analysis indicate that the proposed ESAS meets security requirement.
KW - Cloud computing
KW - attribute-based encryption
KW - conceptual graphs
KW - searchable encryption
KW - semantic search
UR - http://www.scopus.com/inward/record.url?scp=85064971234&partnerID=8YFLogxK
U2 - 10.1109/ICCNC.2019.8685554
DO - 10.1109/ICCNC.2019.8685554
M3 - Conference contribution
AN - SCOPUS:85064971234
T3 - 2019 International Conference on Computing, Networking and Communications, ICNC 2019
SP - 547
EP - 551
BT - 2019 International Conference on Computing, Networking and Communications, ICNC 2019
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 18 February 2019 through 21 February 2019
ER -