作者 :Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou 出處 :IEEE Transactions on Knowledge and Data Engineering(2011) 日期 :2012/05/15 報告人 :

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Hashing.
Indexing DNA Sequences Using q-Grams
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
作者:Soo-Chang Pei, Io-Kuong Tam
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Chapter 5: Introduction to Information Retrieval
Multimedia Database Systems
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Language Model for Cyrillic Mongolian to Traditional Mongolian Conversion Feilong Bao, Guanglai Gao, Xueliang Yan, Hongwei Wang
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Development and validation of an instrument to measure user perceived service quality of information presenting Web portals 報告人 : 謝淳雅
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
Password Authentication Using Hopfield Neural Networks Shouhong Wang; Hai Wang Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Predecessor to the Database: Traditional File Processing Records are stored in files. Programs are customized to process the data.
Instruction Set Architecture (ISA) for Low Power Hillary Grimes III Department of Electrical and Computer Engineering Auburn University.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Performing packet content inspection by longest prefix matching technology Authors: Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu and Chia- Wen Ho Publisher:
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
Hashed Samples Selectivity Estimators for Set Similarity Selection Queries.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
報告人 : 葉瑞群 日期 : 2011/11/10 出處 : IEEE Transactions on Knowledge and Data Engineering.
Data Security in Cloud Computing 云计算中的数据安全 Dr. Kui Ren Associate Professor Department of Computer Science and Engineering State University of New York.
Cloud Computing and its Application in Television and Broadcasting Industry 出處 : School of Information and Engineering, Communication University of ChinaBeijing,
Window NT File System JianJing Cao (#98284).
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
報告人 : 葉瑞群 日期 :2012/01/9 出處 : IEEE Transactions on Knowledge and Data Engineering.
« Pruning Policies for Two-Tiered Inverted Index with Correctness Guarantee » Proceedings of the 30th annual international ACM SIGIR, Amsterdam 2007) A.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Multiple Image Watermarking Applied to Health Information Management
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
ISV Innovation Presented by ISV Innovation Presented by Business Intelligence Fundamentals: Data Cleansing Ola Ekdahl IT Mentors 9/12/08.
An Architecture for Distributed High Performance Video Processing in the Cloud 作者 :Pereira, R.; Azambuja, M.; Breitman, K.; Endler, M. 出處 :2010 IEEE 3rd.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Expert Systems with Applications 34 (2008) 459–468 Multi-level fuzzy mining with multiple minimum supports Yeong-Chyi Lee, Tzung-Pei Hong, Tien-Chin Wang.
Efficient Instant-Fuzzy Search with Proximity Ranking Authors: Inci Centidil, Jamshid Esmaelnezhad, Taewoo Kim, and Chen Li IDCE Conference 2014 Presented.
Keyword Query Routing.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
Similarity Searching in High Dimensions via Hashing Paper by: Aristides Gionis, Poitr Indyk, Rajeev Motwani.
Imaged Document Text Retrieval without OCR IEEE Trans. on PAMI vol.24, no.6 June, 2002 報告人:周遵儒.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012 Kyungmin Lim, Seongwan Kim, Jaeho Lee, Daehyun Pak and Sangyoun Lee, Member, IEEE 報告者:劉冠宇.
1 Information Retrieval LECTURE 1 : Introduction.
作者 :Satyajeet Ahuja and Marwan Krunz 出處 :IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 7, NOVEMBER 2008 報告者 : 黃群凱 1.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Hybrid Load Forecasting Method With Analysis of Temperature Sensitivities Authors: Kyung-Bin Song, Seong-Kwan Ha, Jung-Wook Park, Dong-Jin Kweon, Kyu-Ho.
D-skyline and T-skyline Methods for Similarity Search Query in Streaming Environment Ling Wang 1, Tie Hua Zhou 1, Kyung Ah Kim 2, Eun Jong Cha 2, and Keun.
Web 2.0 Applications. Tasks that can be completed with Dropbox.
Presented By Amarjit Datta
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Graph Indexing From managing and mining graph data.
Advanced Science and Technology Letters Vol.31 (MulGraB 2013), pp An Efficient and Privacy-Preserving.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Searchable Encryption in Cloud
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Privacy Preserving Ranked Multi-Keyword
Information Retrieval and Web Design
Advance Database System
CoXML: A Cooperative XML Query Answering System
Presentation transcript:

作者 :Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou 出處 :IEEE Transactions on Knowledge and Data Engineering(2011) 日期 :2012/05/15 報告人 : 葉瑞群 Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Outline 1. INTRODUCTION 2. RELATED WORK 3. PROBLEM FORMULATION 4. THE STRAIGHTFORWARD APPROACH 5. CONSTRUCTIONS OF EFFECTIVE FUZZY KEYWORD SEARCH IN CLOUD 6. CONCLUSION 2

1. INTRODUCTION(1/2) As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest,these techniques support only exact keyword search. 3

1. INTRODUCTION(2/2) On the other hand, are typical user searching behavior and happen very frequently. This significant drawback makes existing techniques unsuitable in Cloud Computing as it greatly affects system usability, rendering user searching experiences very frustrating and system efficacy very low. 4

2. RELATED WORK(1/2) Enabling fuzzy keyword search service that aims at accommodating various typos and representation inconsistencies in different user searching inputs is of crucial importance for the high system usability and overall user search experience. 5

2. RELATED WORK(2/2) 6

3. PROBLEM FORMULATION(1/4) We consider a cloud data system consisting of data owner, data user and cloud server. Given a collection of n encrypted data files C = (F 1, F 2,..., F N ) stored in the cloud server, a predefined set of distinct keywords W = {w 1, w 2,...,w p }, the cloud server provides the search service for the authorized users over the encrypted data C. 7

3. PROBLEM FORMULATION(2/4) Edit Distance: The edit distance ed(w 1, w 2 ) between two words w1 and w2 is the number of operations required to transform one of them into the other. 1) Substitution:changing one character to another in a word; 2) Deletion:deleting one character from a word; 3) Insertion:inserting a single character into a word. 8

3. PROBLEM FORMULATION(3/4) Edit Distance Example: AAACAGC → AAATTGAGTC (distance=4) AAACAGC AAAGAGTC AAATGAGTC AAATTGAGTC 9

3. PROBLEM FORMULATION(4/4) Fuzzy Keyword Search 1.C=(F 1,F 2,…,F n ) 2.W={W 1,W 2,…,W n } 3.Edit distance d 4.A searching input (w, k) (k<=d) Π =(Setup(1 λ ), Enc(sk, ·), Dec(sk, ·)) T wi = f(sk,w i ) 10

4. THE STRAIGHTFORWARD APPROACH(1/2) FID wi Enc(sk,FID wi ||w i ) {({T w’i }w ’i ∈ Swi,d , Enc(sk,FID wi ||w i ))} wi ∈ W T w = f(sk,w i ) 、 w Enc(sk,FID wi ||w i ) 11 Data Owner Server Users

4. THE STRAIGHTFORWARD APPROACH(2/2) Assume d=1 2k*26 d=2 2k 2 *26 For example, assume there are 10 4 keywords in the file collection with average keyword length 10, d = 2,and the output length of hash function is 160 bits, then, the resulted storage cost for the index will be 30GB. Therefore, it brings forth the demand for fuzzy keyword sets with smaller size. 12

5. CONSTRUCTIONS OF EFFECTIVE FUZZY KEYWORD SEARCH IN CLOUD(1/3) For example,for the keyword CASTLE with the pre-set edit distance 1, S CASTLE,1 = {CASTLE, *CASTLE, *ASTLE, C*ASTLE,C*STLE, · · ·, CASTL*E, CASTL*, CASTLE*}. 13 × = (2 L+ 1) × The wildcard-based fuzzy set of wi with edit distance d is denoted as Swi,d={Swi,0, Swi,1, · · ·, Swi,d}. d=1 (2L+1)*26+1 d=2 C 1 L+1 +C 1 L *C 1 L +2C 2 L+2 13

5. CONSTRUCTIONS OF EFFECTIVE FUZZY KEYWORD SEARCH IN CLOUD(2/3) Reduce the storage of the index from 30GB to approximately 40MB. Π =(Setup(1 λ ), Enc(sk, ·), Dec(sk, ·)) T wi = f(sk,w i ) T w’i = f(sk,w’ i ) for each w’ i ∈ Sw i,d 14

5. CONSTRUCTIONS OF EFFECTIVE FUZZY KEYWORD SEARCH IN CLOUD(3/3) FID wi Enc(sk,FID wi ||w i ) {({T w’i }w ’i ∈ Swi,d , Enc(sk,FID wi ||w i ))} wi ∈ W {Tw’}w’ ∈ S w,k Enc(sk,FID wi ||w i ) 15 Data Owner Users Server

6. CONCLUSION(1/1) We design an advanced technique (i.e., wildcard-based technique) to construct the storage-efficient fuzzy keyword sets by exploiting a significant observation on the similarity metric of edit distance. Based on the constructed fuzzy keyword sets, we further propose an efficient fuzzy keyword search scheme. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search. 16

END 17