INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION.

Slides:



Advertisements
Similar presentations
Introduction to Information Retrieval Introduction to Information Retrieval Lecture 7: Scoring and results assembly.
Advertisements

Location Recognition Given: A query image A database of images with known locations Two types of approaches: Direct matching: directly match image features.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
INSTRUCTOR: DR.NICK EVANGELOPOULOS PRESENTED BY: QIUXIA WU CHAPTER 2 Information retrieval DSCI 5240.
TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Asiacrypt '10 1.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Introduction to Practical Cryptography Lecture 9 Searchable Encryption.
1 Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky Johns Hopkins.
A Novel Scheme for Video Similarity Detection Chu-Hong Hoi, Steven March 5, 2003.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Modern Information Retrieval Chapter 2 Modeling. Can keywords be used to represent a document or a query? keywords as query and matching as query processing.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Reza Curtmola Juan Garay Seny Kamara Rafail Ostrovsky
1 Ranked Queries over sources with Boolean Query Interfaces without Ranking Support Vagelis Hristidis, Florida International University Yuheng Hu, Arizona.
Reza Sherkat ICDE061 Reza Sherkat and Davood Rafiei Department of Computing Science University of Alberta Canada Efficiently Evaluating Order Preserving.
1 Pseudorandom-Permutation Index. 2 Outline Introduction Goh’s Z-IDX PRP-Index Secure game.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
Information retrieval Finding relevant data using irrelevant keys Example: database of photographic images sorted by number, date. DBMS: Well structured.
Modern Information Retrieval Chapter 2 Modeling. Can keywords be used to represent a document or a query? keywords as query and matching as query processing.
Improved Searchable Public Key Encryption with Designated Tester Author : Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee Presenter: Li-Tzu.
Chapter 5: Information Retrieval and Web Search
Large-Scale Content-Based Image Retrieval Project Presentation CMPT 880: Large Scale Multimedia Systems and Cloud Computing Under supervision of Dr. Mohamed.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
作者 :Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou 出處 :IEEE Transactions on Knowledge and Data Engineering(2011) 日期 :2012/05/15 報告人 :
Privacy Preserving Query Processing in Cloud Computing Wen Jie
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Sanjay Agarwal Surajit Chaudhuri Gautam Das Presented By : SRUTHI GUNGIDI.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Privacy Preservation of Aggregates in Hidden Databases: Why and How? Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Chaudhuri Presented by PENG Yu.
Chapter 6: Information Retrieval and Web Search
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Contextual Ranking of Keywords Using Click Data Utku Irmak, Vadim von Brzeski, Reiner Kraft Yahoo! Inc ICDE 09’ Datamining session Summarized.
Efficient Instant-Fuzzy Search with Proximity Ranking Authors: Inci Centidil, Jamshid Esmaelnezhad, Taewoo Kim, and Chen Li IDCE Conference 2014 Presented.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Mining Multiple Private Databases Topk Queries Across Multiple Private Databases (2005) Mining Multiple Private Databases Using a kNN Classifier (2007)
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
CVPR2013 Poster Detecting and Naming Actors in Movies using Generative Appearance Models.
Multi-object Similarity Query Evaluation Michal Batko.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
Advantages of Query Biased Summaries in Information Retrieval by A. Tombros and M. Sanderson Presenters: Omer Erdil Albayrak Bilge Koroglu.
1 Data Mining: Text Mining. 2 Information Retrieval Techniques Index Terms (Attribute) Selection: Stop list Word stem Index terms weighting methods Terms.
Presented By Amarjit Datta
Date: 2013/4/1 Author: Jaime I. Lopez-Veyna, Victor J. Sosa-Sosa, Ivan Lopez-Arevalo Source: KEYS’12 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang KESOSD.
Unsupervised Salience Learning for Person Re-identification
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
Searching Over Encrypted Data Charalampos Papamanthou ECE and UMIACS University of Maryland, College Park Research Supported By.
Statistical techniques for video analysis and searching chapter Anton Korotygin.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou University.
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System Source: Pairing 2007, LNCS 4575, pp.2-22, 2007 Author: Yong.
Secret computation of purchase history data using somewhat homomorphic encryption Date: Reporter: 許哲毓.
All Your Queries are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou University.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
Advanced Science and Technology Letters Vol.31 (MulGraB 2013), pp An Efficient and Privacy-Preserving.
Searchable Encryption in Cloud
An Efficient Algorithm for Incremental Update of Concept space
Efficient Multi-User Indexing for Secure Keyword Search
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Privacy Preserving Ranked Multi-Keyword
Ning Chen1, Steven C.H. Hoi2, Shaohua Li3, Xiaokui Xiao3
موضوع پروژه : بازیابی اطلاعات Information Retrieval
INFORMATION RETRIEVAL TECHNIQUES BY DR. ADNAN ABID
CS 430: Information Discovery
Combining Keyword and Semantic Search for Best Effort Information Retrieval  Andrew Zitzelberger 1.
Information Retrieval and Web Design
J. Byun et al. In Secure Data Management, LNCS 4165,
Presentation transcript:

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Presenter :刘 燕

INTRODUCTION PROBLEM FORMULATION FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE PRIVACY-PRESERVING AND EFFICIENT MRSE PERFORMANCE ANALYSIS RELATED WORK CONCLUSION

inner product similarity INTRODUCTION coordinate matching as many matches as possible inner product similarity the number of query keywords appearing in a document k-nearest neighbor technique

PROBLEM FORMULATION System Model

PROBLEM FORMULATION Threat Model Known Ciphertext Model only know encrypted dataset C and searchable index I Known Background Model know encrypted dataset C , searchable index I and some backgrounds on the dataset

PROBLEM FORMULATION Design Goals Multi-keyword Ranked Search Privacy-Preserving Efficiency

PROBLEM FORMULATION Notations

Preliminary on Coordinate Matching PROBLEM FORMULATION Preliminary on Coordinate Matching a hybrid of conjunctive search and disjunctive search uses the number of query keywords appearing in the document to quantify the similarity of that document to the query

FRAMEWORK AND PRIVACY REQUIREMENTS MRSE Framework

FRAMEWORK AND PRIVACY REQUIREMENTS Privacy Requirements for MRSE Keyword Privacy Trapdoor Privacy Search Pattern Access Pattern

PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE I: Basic Scheme Secure kNN Computation [d+1]= [d+1]= 1

PRIVACY-PRESERVING AND EFFICIENT MRSE S[j]=0 = = + = S[j]=1 + = = =

PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE I Scheme:

PRIVACY-PRESERVING AND EFFICIENT MRSE

PRIVACY-PRESERVING AND EFFICIENT MRSE

PRIVACY-PRESERVING AND EFFICIENT MRSE

PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE II: Privacy-Preserving Scheme 1) Min/Max Score Analysis Attack:

PRIVACY-PRESERVING AND EFFICIENT MRSE

PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE II Scheme:

PRIVACY-PRESERVING AND EFFICIENT MRSE MRSE III: Privacy-Preserving Scheme 1) Scale Analysis Attack:

PRIVACY-PRESERVING AND EFFICIENT MRSE

PRIVACY-PRESERVING AND EFFICIENT MRSE 2) MRSE III Scheme:

PERFORMANCE ANALYSIS A. Precision and Privacy

PERFORMANCE ANALYSIS B. Efficiency 1) Index Construction:

PERFORMANCE ANALYSIS 2) Trapdoor Generation:

PERFORMANCE ANALYSIS 3) Query:

RELATED WORK Single Keyword Searchable Encryption Boolean Keyword Searchable Encryption

CONCLUSION Coordinate Matching as many matches as possible Inner Product Similarity Basic MRSE Scheme Privacy-Preserving Scheme in Known Ciphertext Model Privacy-Preserving Scheme in Known Background Mode

Thank You!