Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter :刘 燕
INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION
inner product similarity INTRODUCTION coordinate matching as many matches as possible inner product similarity the number of query keywords appearing in a document k-nearest neighbor technique
PROBLEM FORMULATION System Model
PROBLEM FORMULATION Threat Model Known Ciphertext Model only know encrypted dataset C and searchable index I Known Background Model know encrypted dataset C , searchable index I and some backgrounds on the dataset
PROBLEM FORMULATION Design Goals Multi-keyword Ranked Search Privacy-Preserving Efficiency
PROBLEM FORMULATION Notations
Preliminary on Coordinate Matching PROBLEM FORMULATION Preliminary on Coordinate Matching a hybrid of conjunctive search and disjunctive search uses the number of query keywords appearing in the document to quantify the similarity of that document to the query
FRAMEWORK AND PRIVACY REQUIREMENTS MRSE Framework
FRAMEWORK AND PRIVACY REQUIREMENTS Privacy Requirements for MRSE Keyword Privacy Trapdoor Privacy Search Pattern Access Pattern
PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE I: Basic Scheme Secure kNN Computation [d+1]= [d+1]= 1
PRIVACY-PRESERVING AND EFFICIENT MRSE S[j]=0 = = + = S[j]=1 + = = =
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE I Scheme:
PRIVACY-PRESERVING AND EFFICIENT MRSE
PRIVACY-PRESERVING AND EFFICIENT MRSE
PRIVACY-PRESERVING AND EFFICIENT MRSE
PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:
PRIVACY-PRESERVING AND EFFICIENT MRSE
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE II Scheme:
PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE III: Privacy-Preserving Scheme 1) Scale Analysis Attack:
PRIVACY-PRESERVING AND EFFICIENT MRSE
PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE III Scheme:
PERFORMANCE ANALYSIS A. Precision and Privacy
PERFORMANCE ANALYSIS B. Efficiency 1) Index Construction:
PERFORMANCE ANALYSIS 2) Trapdoor Generation:
PERFORMANCE ANALYSIS 3) Query:
RELATED WORK Single Keyword Searchable Encryption Boolean Keyword Searchable Encryption
CONCLUSION Coordinate Matching as many matches as possible Inner Product Similarity Basic MRSE Scheme Privacy-Preserving Scheme in Known Ciphertext Model Privacy-Preserving Scheme in Known Background Mode
Thank You!