Page 89 - Read Online
P. 89

Page 82                 Salmani et al. J Surveill Secur Saf 2020;1:79–101  I http://dx.doi.org/10.20517/jsss.2020.16






                                                Index                        Query encryption

                                Files
                                    Keyword Extraction
                          Data Owner
                                                                                         Data Users
                                                        Secret Key K

                                        Figure 1. Architecture of the search over encrypted cloud data.


               liminary. In Section 3, we describe the LRSE privacy requirements. Section 4 shows the proposed schemes in
               detail, followed by Section 5 which presents the privacy and security analysis. We summarize related works
               on privacy-preserving multi-keyword ranked search over encrypted cloud data in Section 6, and Section 7
               summarizes our conclusions.



               2   PROBLEM FORMULATION
               2.1  Design goals
               To address the aforementioned privacy issues (see Section 1), our design system should achieve privacy, secu-
               rity, and a high level of performance simultaneously with the following three goals:

                • Leakless ranked search: For the sake of effective data retrieval and preserving privacy, data users should
                  be able to generate a leakless search query which reveals nothing more than the encrypted query.


                • Privacy-preserving: Preventing the cloud server from learning additional information rather than seeing
                  encrypted files, queries, and indexes is our highest goals. We describe the privacy requirements in Section 3.

                • Efficiency: All of the above goals should be realized with a reasonable (or low) computation and commu-
                  nication overhead.

               2.2  Preliminaries
               Let D = {D 1 ,. . ., D n } be a corpus of n documents, and id(D i ) be the unique identifier of the of document D i.
               Let ∆ be a dictionary of keywords with size m. Let ∆ d = {w 1 ,. . .,w d } be the dictionary of the d words for the
               corpus D such that ∆ d ⊆ ∆.

               Definition 1. (Searchable Encryption). A multi-keyword Searchable Encryption (SE) scheme consists of 6
               algorithms, SE = (KeyGen, BuildIndex, Encryption,Query,Search, Decryption) such that:
                           λ
               1. KeyGen (1 ): Taking a security parameter λ as an input and outputs a secret key K.

               2. BuildIndex (D): This algorithm takes in a corpus of documents D = {D 1 ,. . ., D n } and generates an in-
                  dex I.


               3. Encryption (D,I,K): The encryption algorithm takes a document corpus D, an index I and a secret key
                  K as input and outputs an encrypted document corpus C = {C 1 ,. . .,C n }, and a secure index SI.


               4. Query (∆ q ,K): This algorithm takes a set of keywords ∆ q ⊆ ∆ d, and a secret key K as input, and generates
                  an encrypted query q.

               5. Search (q,SI): The search algorithm takes an encrypted query q and the secure index SI as input, it
   84   85   86   87   88   89   90   91   92   93   94