Privacy Preserving Ranked Multi-Keyword

Slides:



Advertisements
Similar presentations
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Advertisements

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
作者 :Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou 出處 :IEEE Transactions on Knowledge and Data Engineering(2011) 日期 :2012/05/15 報告人 :
Regular Expression Search over Encrypted Big Data in the Cloud Mohsen Amini Salehi Visiting Assistant Professor CACS Department Spring ‘15 1.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Identity-Based Secure Distributed Data Storage Schemes.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
A New Time-Memory-Resource Trade-Off Method for Password Recovery Communications and Intelligence Information Security (ICCIIS), 2010 International Conference.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
Presented By Amarjit Datta
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Advanced Science and Technology Letters Vol.31 (MulGraB 2013), pp An Efficient and Privacy-Preserving.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Non-PKI Methods for Public Key Distribution
Searchable Encryption in Cloud
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Efficient Multi-User Indexing for Secure Keyword Search
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Source: IEEE Signal Processing Letters (Accepted)2016
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Anonymous Wireless Authentication on a Portable Cellular Mobile System
State of the art – Part 1 Xin Jin
Sindhusha Doddapaneni
Efficient Time-Bound Hierarchical Key Assignment Scheme
ATM using fingerprint
Chair Professor Chin-Chen Chang Feng Chia University
based on slides by Debra Cook
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
An Introduction to Cloud Computing
A Novel Latin Square-based Secret Sharing for M2M Communications
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
A new chaotic algorithm for image encryption
J. Byun et al. In Secure Data Management, LNCS 4165,
Verifiable Attribute Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud They really need a shorter title.
Source: Sensors, Volume 19, Issue 9 (May )
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Ranking using Multiple Document Types in Desktop Search
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Source : IEEE Transactions on Computers , 2015 Authors :Wei Zhang, Yaping Lin, Sheng Xiao, Die Wu, Siwang Zhou Speaker : Pengxu Tian Date: 2017/09/21 In this paper, authors proposed a new authentication scheme for heterogeneous WSN. Therefore, I will introduce heterogeneous WSN later.

Outline Introduction Proposed scheme Performance analysis This is my outline First, I will introduce what is heterogeneous WSN. And then is Proposed scheme.

Introduction Background of Searchable Encryption: Cloud computing Security concern

Introduction Basic system model for Searchable Encryption Data Owner Data Users

Introduction Preliminary Bilinear map:

Proposed scheme(1/9) System model of this paper (3) (5) (6) (4) (2) (7) (5) (1) (6) (2) (4)

Proposed scheme(2/9) Notation Description The trapdoor for 𝑇 𝑊 Oi A data owner Fi The plaintext file collection of Oi Ci The ciphertext file collection of Fi W The keyword collection 𝑊 𝑖 Oi’s encrypted keyword collection of W 𝑊 The subset of W which represents queried keywords 𝑇 𝑊 The trapdoor for 𝑇 𝑊 𝑆 𝑖,𝑗,𝑡 The relevance score of tth keyword to jth file of ith data owner

Proposed scheme(3/9) Data user authentication

Proposed scheme(4/9) Keyword encryption 𝑆 𝑎 = 𝑔 𝑘 𝑎1 ⋅ 𝑘 𝑎2 ⋅ 𝑟 𝑎 𝑆 𝑎 = 𝑔 𝑘 𝑎1 ⋅ 𝑘 𝑎2 ⋅ 𝑟 𝑎 Data Owner Administration server Cloud server

Proposed scheme(5/9) Trapdoor generation 𝑆 𝑎 = 𝑔 𝑘 𝑎1 ⋅ 𝑘 𝑎2 ⋅ 𝑟 𝑎 𝑆 𝑎 = 𝑔 𝑘 𝑎1 ⋅ 𝑘 𝑎2 ⋅ 𝑟 𝑎 Data user Administration server Cloud server

Proposed scheme(6/9) Match algorithm

Proposed scheme(7/9) Ranked search

Proposed scheme(8/9) Ranking search results For the same data owner For different data owners 𝑇 𝑗,2 𝐻 𝑖 𝑖

Proposed scheme(9/9) Ranking search results

Performance analysis identity or password bytes, nonce 16 bytes, timestamp 19 bytes, hash value 20 bytes, symmetric key 16 bytes

Performance analysis identity or password bytes, nonce 16 bytes, timestamp 19 bytes, hash value 20 bytes, symmetric key 16 bytes

Thanks for attention