Page 106 - Read Online
P. 106

Salmani et al. J Surveill Secur Saf 2020;1:79–101  I http://dx.doi.org/10.20517/jsss.2020.16  Page 99


               Nevertheless, all these methods suffer from private information leakage such as access pattern, search pattern,
               and co-occurrence information leakage. Cao et al. [9]  believe that, to solve this problem, we must “touch” the
               whole outsourced dataset, which ends in losing the efficiency so other investigators chose not to impede these
               leaks which kept them out of the designed goals.




               8   CONCLUSIONS
               The problem of leakless preserving privacy multi-keyword ranked search in SSE schemes, addressed here. We
               built a private model to prevent two kinds of leakage: search pattern and co-occurrence private information
               leakage. We employed the asymmetric inner-product to calculate the relevance score of each document with
               respect to the query. We also introduced our chaining encryption notion to generate multiple ciphertexts
               for the same keyword. All this leads to more uncertainty and a uniform probability model for the keywords
               distribution. Furthermore, with our chaining encryption notion, the data user is able to randomly choose a
               portion of the ciphertexts for each keyword. Thus even if consecutive queries share some keywords, the cloud
               is not able to find a pattern between the queries due to using different versions of ciphertexts in each query.
               Moreover, co-occurring terms appear with different ciphertexts in the encrypted documents, and so, finding
               the co-occurring terms becomes significantly more difficult for the cloud. Next, to tackle the challenge of
               leakless multi-keyword ranked search, we propose the LRSE scheme and define the privacy requirements. In
               addition, we explain each level of the LRSE scheme in details and describe the required algorithms.


               Furthermore, we performed the security and privacy analysis to show the efficiency of our proposed approach.
               We proved the the novel chaining notion and consequently LRSE is secure and compared complexity of our
               proposed scheme with related work in various criteria such as server computation, communication, etc. Look-
               ing to the future, we will modify LRSE to prevent access pattern attack.



               DECLARATIONS
               Authors’ contributions
               Each author contributed equally to the paper.


               Availability of data and materials
               Not applicable.


               Financial support and sponsorship
               This research is partly supported by the Natural Sciences and Engineering Research Council of Canada.


               Conflicts of interest
               All authors declared that there are no conflicts of interest.


               Ethical approval and consent to participate
               Not applicable.


               Consent for publication
               Not applicable.


               Copyright
               © The Author(s) 2020.
   101   102   103   104   105   106   107   108   109   110   111