Visible to the public A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data

TitleA Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Publication TypeConference Paper
Year of Publication2017
AuthorsDai, H., Zhu, X., Yang, G., Yi, X.
Conference Name2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)
Date Publishedaug
ISBN Number978-1-5386-3349-6
Keywordsbig data security in the cloud, cloud computing, cloud data, cloud servers, Computer science, data integrity, Data models, existing secure keyword search methods, insider attacks, integrity verification, Keyword search, Metrics, outsourcing, Protocols, pubcrawl, Resiliency, resource outsourcing, Scalability, security issues, security of data, Servers, Top-k, verifiable single keyword top-k search scheme, verification codes
Abstract

With the development of cloud computing and its economic benefit, more and more companies and individuals outsource their data and computation to clouds. Meanwhile, the business way of resource outsourcing makes the data out of control from its owner and results in many security issues. The existing secure keyword search methods assume that cloud servers are curious-but-honest or partial honest, which makes them powerless to deal with the deliberately falsified or fabricated results of insider attacks. In this paper, we propose a verifiable single keyword top-k search scheme against insider attacks which can verify the integrity of search results. Data owners generate verification codes (VCs) for the corresponding files, which embed the ordered sequence information of the relevance scores between files and keywords. Then files and corresponding VCs are outsourced to cloud servers. When a data user performs a keyword search in cloud servers, the qualified result files are determined according to the relevance scores between the files and the interested keyword and then returned to the data user together with a VC. The integrity of the result files is verified by data users through reconstructing a new VC on the received files and comparing it with the received one. Performance evaluation have been conducted to demonstrate the efficiency and result redundancy of the proposed scheme.

URLhttp://ieeexplore.ieee.org/document/8113054/
DOI10.1109/BIGCOM.2017.56
Citation Keydai_verifiable_2017