310 likes | 867 Views
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter : 刘 燕. INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION. INTRODUCTION. coordinate matching
E N D
Privacy-Preserving Multi-keyword Ranked Searchover Encrypted Cloud DataPresenter :刘 燕
INTRODUCTION • PROBLEM FORMULATION • FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE • PRIVACY-PRESERVING AND EFFICIENT MRSE • PERFORMANCE ANALYSIS • RELATED WORK • CONCLUSION
INTRODUCTION • coordinate matching as many matches as possible • inner product similarity the number of query keywords appearing in a document • k-nearest neighbor technique
PROBLEM FORMULATION System Model
PROBLEM FORMULATION Threat Model • Known Ciphertext Model only know encrypted dataset C and searchable index I • Known Background Model know encrypted dataset C , searchable index I and some backgrounds on the dataset
PROBLEM FORMULATION Design Goals • Multi-keyword Ranked Search • Privacy-Preserving • Efficiency
PROBLEM FORMULATION Notations
PROBLEM FORMULATION Preliminary on Coordinate Matching • a hybrid of conjunctive search and disjunctive search • uses the number of query keywords appearing in the document to quantify the similarity of that document to the query
FRAMEWORK AND PRIVACY REQUIREMENTS MRSE Framework
FRAMEWORK AND PRIVACY REQUIREMENTS Privacy Requirements for MRSE • Keyword Privacy • Trapdoor Privacy • Search Pattern • Access Pattern
PRIVACY-PRESERVING AND EFFICIENT MRSE • MRSE I: Basic Scheme • Secure kNN Computation [d+1]= [d+1]= 1
PRIVACY-PRESERVING AND EFFICIENT MRSE S[j]=0 = = + = S[j]=1 + = = =
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE I Scheme:
PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE II Scheme:
PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE III: Privacy-Preserving Scheme 1) Scale Analysis Attack:
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE III Scheme:
PERFORMANCE ANALYSIS A. Precision and Privacy
PERFORMANCE ANALYSIS B. Efficiency 1) Index Construction:
PERFORMANCE ANALYSIS 2) Trapdoor Generation:
PERFORMANCE ANALYSIS 3) Query:
RELATED WORK • Single Keyword Searchable Encryption • Boolean Keyword Searchable Encryption
CONCLUSION • Coordinate Matching as many matches as possible • Inner Product Similarity • Basic MRSE Scheme • Privacy-Preserving Scheme in Known Ciphertext Model • Privacy-Preserving Scheme in Known Background Mode