A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Title | A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Dai, H., Zhu, X., Yang, G., Yi, X. |
Conference Name | 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM) |
Date Published | aug |
ISBN Number | 978-1-5386-3349-6 |
Keywords | big data security in the cloud, cloud computing, cloud data, cloud servers, Computer science, data integrity, Data models, existing secure keyword search methods, insider attacks, integrity verification, Keyword search, Metrics, outsourcing, Protocols, pubcrawl, Resiliency, resource outsourcing, Scalability, security issues, security of data, Servers, Top-k, verifiable single keyword top-k search scheme, verification codes |
Abstract | With the development of cloud computing and its economic benefit, more and more companies and individuals outsource their data and computation to clouds. Meanwhile, the business way of resource outsourcing makes the data out of control from its owner and results in many security issues. The existing secure keyword search methods assume that cloud servers are curious-but-honest or partial honest, which makes them powerless to deal with the deliberately falsified or fabricated results of insider attacks. In this paper, we propose a verifiable single keyword top-k search scheme against insider attacks which can verify the integrity of search results. Data owners generate verification codes (VCs) for the corresponding files, which embed the ordered sequence information of the relevance scores between files and keywords. Then files and corresponding VCs are outsourced to cloud servers. When a data user performs a keyword search in cloud servers, the qualified result files are determined according to the relevance scores between the files and the interested keyword and then returned to the data user together with a VC. The integrity of the result files is verified by data users through reconstructing a new VC on the received files and comparing it with the received one. Performance evaluation have been conducted to demonstrate the efficiency and result redundancy of the proposed scheme. |
URL | http://ieeexplore.ieee.org/document/8113054/ |
DOI | 10.1109/BIGCOM.2017.56 |
Citation Key | dai_verifiable_2017 |
- outsourcing
- verification codes
- verifiable single keyword top-k search scheme
- Top-k
- Servers
- security of data
- security issues
- Scalability
- resource outsourcing
- Resiliency
- pubcrawl
- Protocols
- big data security in the cloud
- Metrics
- Keyword search
- integrity verification
- insider attacks
- existing secure keyword search methods
- Data models
- data integrity
- computer science
- cloud servers
- cloud data
- Cloud Computing