eCite Digital Repository

Privacy-aware relevant data access with semantically enriched search queries for untrusted cloud storage services

Citation

Pervez, Z and Ahmad, M and Khattak, AM and Lee, S and Chung, TC, Privacy-aware relevant data access with semantically enriched search queries for untrusted cloud storage services, PLoS One, 11, (8) Article e0161440. ISSN 1932-6203 (2016) [Refereed Article]


Preview
PDF
2Mb
  

Copyright Statement

Copyright 2016 Pervez et al. Licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/

DOI: doi:10.1371/journal.pone.0161440

Abstract

Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to predefined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

Item Details

Item Type:Refereed Article
Keywords:algorithms, cloud computing, computer security
Research Division:Information and Computing Sciences
Research Group:Distributed Computing
Research Field:Distributed and Grid Systems
Objective Division:Information and Communication Services
Objective Group:Communication Networks and Services
Objective Field:Fixed Line Data Networks and Services
Author:Lee, S (Professor Sungyoung Lee)
ID Code:122923
Year Published:2016
Web of Science® Times Cited:1
Deposited By:Information and Communication Technology
Deposited On:2017-12-06
Last Modified:2018-02-08
Downloads:6 View Download Statistics

Repository Staff Only: item control page