Professional Documents
Culture Documents
ABSTRACT Encrypted search technology has been studied extensively in recent years. With more and more
information being stored in cloud, creating indexes with independent keywords has resulted in enormous
storage cost and low search accuracy, which has become an urgent problem to be solved. Thus, in this paper,
we propose a new feature matching ranked search mechanism (FMRSM) for encrypted cloud data. This
mechanism uses feature score algorithm (FSA) to create indexes, which allows multi-keywords which are
extracted from a document as a feature to be mapped to one dimension of the index. Thus, the storage cost
of indexes can be reduced and the efficiency of encryption can be improved. Moreover, FMRSM uses a
matching score algorithm (MSA) in generating trapdoor process. With the help of FSA, the matching score
algorithm can rank the search results according to the type of match and the number of matching keywords,
and therefore it is able to return results with higher ranking accuracy. Comprehensive analysis prove that our
mechanism is more feasible and effective.
INDEX TERMS Encrypted search, feature score, storage cost, matching score, ranking accuracy.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 8, 2020 114057
L. Liu, Q. Chen: Novel FMRSM Over Encrypted Cloud Data
In this paper, we propose a new feature matching ranked However, all above searchable encryption schemes are based
search mechanism (FMRSM) for encrypted cloud data. In the on single keyword search or specific application situations.
process of creating indexes, we first propose a feature score Thus, they can’t meet users’ actual search requirements.
algorithm (FSA) that can map multiple keywords which are Unlike single keyword search, conjunctive keywords
extracted from a document to one dimension of the index. search or multi-keyword search methods can allow users to
Therefore, comparing with creating indexes with independent input multiple keywords in a request to query and return
keywords, this mechanism can not only reduce index dimen- results containing these keywords. Cui et al. [21] proposed
sions, but also improve the efficiency of encryption. During a public key searchable encryption scheme that can perform
the generating trapdoor process of FMRSM, we design a multiple keywords search in an expression search formula.
novel matching score algorithm (MSA). This algorithm can Ali and Lu [22] proposed a symmetric encryption scheme
not only focus on the matching relationship between query that supports connecting keywords search, and this scheme
keywords and features, but also comprehensively consider does not need to specify the location of the keyword. In addi-
each matching type to return results that are closer to user’s tion, pseudo-random functions and bloom filters are used
real request. The contributions of this paper are summarized in the scheme to ensure index security. Yang and Ma [23]
as follows. proposed a new conjunctive keywords search method for
(1) For the first time, we propose a novel feature score electronic health record systems. This method supports
algorithm to create indexes, which allows multiple automatic delegating revocation, which is the first search-
keywords extracted from a document as a feature to able encryption scheme that enables proxy re-encryption.
be mapped to one dimension of the index to achieve Kerschbaum [24] addressed the issue of associating a key-
the purpose of accelerating the encryption process and word with a position in existing schemes, and propose a
reducing storage cost. search method that does not need to specify the location
(2) In the generating trapdoor process of FMRSM, of the connecting keywords. Fu et al. [9] first proposed a
a matching score algorithm is designed. With the help multi-keyword ranked search scheme based on synonyms
of FSA, this algorithm can rank search results accord- for encrypted cloud data. When authorized users enter syn-
ing to the matching types and the number of matching onyms of predefined keywords, they can also perform search.
keywords, and therefore the returned results have a Fu et al. later proposed central keyword-based semantic
higher ranking accuracy. extension ranked scheme [25]. By extending the central query
The rest of this paper is arranged as follows. In section II, keyword, a good trade-off between search functionality and
we introduce related work of encrypted search. Section III efficiency was made.
describes the system model, the threat model, and the design In recent years, some scholars have proposed phrase
goals. Also, in this section, we describe some related terms search schemes for encrypted data. Unlike supporting multi-
used in this paper in detail. Then we present the proposed keyword search or conjunctive keywords search method,
feature matching ranked search mechanism in section IV. phrase search requires comprehensive consideration of
In section V, we analyze the performance of our mechanism. each keyword information, including semantics, order, and
Finally, we conclude this paper in section VI. location. Poon and Miri [26] designed an encrypted search
scheme that supports both conjunctive keyword search and
II. RELATED WORK phrase search. The scheme fully considered the statisti-
Heinlein [4] first defined the concept of encrypted cal properties of natural language to reduce storage cost.
search. They believe that storing encrypted data in the cloud Their next work [27] proposed a phrase search technique
can not only save local storage cost but also reduce security based on bloom filter, which for the first time supports
risks. However, they are also worry about the leakage of phrase-independent query. Tang et al. [18] defined a sym-
private information in uncontrolled remote storage environ- metric searchable encryption model, and then proposed a
ments at the same time. For this reason, they first proposed symmetric encryption phrase search scheme that can per-
a full-text search scheme for encrypted data and verified its form secure and efficient phrase search over encrypted data.
security. Goh et al. [19] first used a bloom filter as an index Zittrower and Zuo [28] proposed a scheme that allows
structure and each index is connected to a document. The hash phrase search and multi-keyword search for encrypted
function is used to map keywords to codes which are stored in datasets. By storing the keyword location information,
corresponding positions of the bloom filter. While querying, a comprehensive encrypted search function is achieved.
people can determine whether each index contains query Yin et al. [29]–[31] further consider the secure search prob-
keywords by mapping again. Although this method does lem based on a practical application scenario that a data
not result in missing search results, it may return irrelevant owner needs to grant different keyword query permissions
search information. Boneh et al. [20] described an untrusted for different data users to achieve flexible access control on
routing problem and created a public-key encryption scheme outsourced encrypted data in the cloud computing environ-
that allows PIR (private information retrieval) on encrypted ment, several secure search schemes have been proposed to
documents. For the first time, this scheme can solve the meet the challenge of secure search over encrypted cloud
problem of search without leaking user query information. data. Due to the amount of encrypted files stored in cloud
is becoming very huge, which will hinder efficient query TABLE 1. Notations.
processing, Li et al. [32]–[35] presented a few schemes with
outsourcing key-issuing and outsourcing decryption, which
can implement keyword search function. Guo et al. [36]–[38]
did valuable research in the field of data privacy in cloud com-
puting and proposed several schemes over encrypted cloud
data, which also supports dynamic update operations, such
as adding or deleting files.
Although the above related work has improved the search-
able encryption technology from different aspects, the fol-
lowing problems still need to be solved: (1) The amount
of encryption calculation increases with the size of dictio-
nary, and when a large number of keywords are extracted,
it will inevitably lead to huge computational cost; (2) The
search results of existing schemes depend on similarity
scores or independent keyword matching relationships. They
do not comprehensively consider the number of matching
keywords and the overall matching relationship, which will
result in low query accuracy. Therefore, it is imminent to
design a new mechanism to solve these problems.
D. DESIGN GOAL
In order to reduce storage cost and improve search accuracy,
our mechanism tries to achieve the following goals.
FIGURE 1. System model.
1) FEATURE INDEX
Our goal is to map multiple keywords extracted from a doc-
ument to one dimension of the index by using a feature score
B. SYMBOL DESCRIPTION algorithm. That is, each dimension of the index corresponds
The symbol descriptions are shown as below. to a feature.
C. CREATION OF TRAPDOOR calculates the score of the trapdoor and each document index.
Step1: When authorized users enter keywords to query, Then, the search results are ranked according to the value of
→
we first create an n-dimension query request q . Each dimen- the score, and the ‘‘top-k’’ documents with the highest scores
→ are returned to the authorized user. The search process are as
sion of q is the matching score of a query keyword set e and
follows.
a feature dj (j = 1, 2, .., n). The method of calculating the → → → →
i M1 , pi M2 } · {M1 q , M2 q }
−1 0 −1 00
matching score is shown in Algorithm2.
→
Ii · T = {p0T 00T
ε should be larger
P (v)
the preset security, the number of keywords from document Fi , we specify that gi is exactly
than 2ω [25] when giving system parameter ω. Besides, match with dj . Exact match indicates that the feature dj
ε is Cuv which is maximized
P (v)
the number of different can fully reflect the real content of Fi . Therefore, the j-th
when u/v = 2 and Cuv ≥ (u/v)v . Therefore, when u = 2ω dimension of index pi should have the highest score, and in
and v = ω, our scheme can achieve the security goal. Algorithm1, we set the highest feature score to IS. When gi
In addition, each ε (j) follows the same uniform distribution is different from dj , we think that they are partially matched.
U (µ0 − c, µ0 + c), and their mean is µ0 and variance P is Partial match includes two cases, where gi and dj have no
σ 0 = c2 /3. According to the central limit theorem, the ε (v) intersections or they have common elements. The first case
follows the normal distribution N (µ, σ 2 ), where their mean indicates that the feature dj can not reflect the information of
µ is ωµ0 and variance σ 2 is ωc2 /3. In the normal distribution Fi , Thus, the j dimensional feature score of the index pi will
N (µ, σ 2 ), the larger the σ value, the more difficult it is for be 0. The second case indicates that the feature dj can reflect
the cloud server to analyze the similarity information between some of the information of Fi , which depends on the number
initial index vectors, but the search accuracy will be reduced. of matching keywords in gi and dj . We use the sum of the
Therefore, it is necessary to choose the value of σ reasonably normalized term frequency of these matching keywords in Fi
between the privacy protection and the search accuracy. to represent their feature score. However, using this method
directly will result in the ‘‘error order’’. In order to improve
3) EFFICIENCY
ranking accuracy, distinguishing parameters are introduced
FMRSM uses feature score algorithm to create indexes
while calculating the normalized term frequency of each
to reduce dimensions. The specific analysis are as fol-
matching keyword in Algorithm1. That is, we use TF(vi,b ) +
lows. When we create indexes with independent keywords,
αb to represent the score of the b-th matching keyword vi,b ,
the number of dimensions of each index is related to the
where α0 = 0, {αb }(b > 1) is a geometric progression whose
total number of terms and is greater than the total number of
first item is α and public ratio is qα . For example, when
documents. When a large number of keywords are extracted
the feature dj = {‘‘cloud computing’’, ‘‘multi-keyword’’,
from a document, it will inevitably result in huge storage
‘‘ranked search’’} and the feature
P gi = {‘‘cloud computing’’,
cost and computational burden. Our feature score algorithm
‘‘ranked search’’}, we use (TF(vi,b ) + αb ) to represent
allows a plurality of keywords which are extracted from a _
vi,b ∈W
document as a feature to be mapped to one dimension of _
the index. Thus, the index dimension n is not greater than the value of the j-th dimension in the index pi , where W =
the total number of documents m. Therefore, comparing with {‘‘cloud computing’’, ‘‘ranked search’’}. The introduction
creating indexes with independent keywords, this algorithm of distinguishing parameters will make the feature score
can reduce storage cost and accelerate the encryption and of (n + 1)-th matching keywords much larger than that of
search process. n-th matching keywords. Therefore, in partial match,
In existing encrypted ranked search schemes, multiple key- the more matching keywords there are in gi and dj , the higher
words in the dictionary are independently mapped to different the feature score will be.
dimensions of the index. When we use ‘‘TF-IDF’’ rule to In generating trapdoor process, Algorithm2 gives different
calculate a document score, it is very likely that an ‘‘error matching scores according to different matching relation-
order’’ will occur. For example, when we extract keywords ships between query keyword set e and feature dj , which
from documents Fi and Fj to form features gi = {‘‘cloud are respectively described as follows. When e is the same
computing’’, ‘‘ranked search’’} and gj = {‘‘cloud comput- as dj , we specify that they are exact match. Exact match
ing’’}, it may happen that the sum of the weights of ‘‘cloud indicates that the j-th dimension of query request q is the
computing’’ and ‘‘ranked search’’ in Fi is less than the weight user’s real query requirements, so it should have the highest
of ‘‘cloud computing’’ in Fj . This situation is very common, matching score, which is set to QS in Algorithm2. If e and
because ‘‘cloud computing’’ and ‘‘ranked search’’ appear dj are not the same, we define them as partial match. In this
less in Fi . However, ‘‘cloud computing’’ appears more in case, we use the sum of the normalized anti-term frequency
Fj . If users enter ‘‘cloud computing’’ and ‘‘ranked search’’ of their matching keywords to represent the matching score.
to query, Fj will be returned preferentially according to its In order to avoid the ‘‘error order’’, different parameters are
score, which obviously does not meet the user’s real query introduced while calculating normalized anti-term frequency.
requirement. Algorithm1 and Algorithm 2 can improve the That is, we use IDF(vj,b ) + βb to represent the score of the
accuracy of query results. They comprehensively consider the b-th matching keyword vj,b , where β0 = 0, and {βb }(b > 1)
matching relationship between features and query terms, and is a geometric progression whose first item is β and public
then give each query keyword different score according to the ratio is qβ . For example, when the feature dj = {‘‘cloud com-
matching types and the number of matching keywords. puting’’, ‘‘multi-keyword ’’, ‘‘ ranked search’’} and the query
In the process of creating indexes, Algorithm1 comprehen- keyword set e = {‘‘cloud computing’’, ‘‘feature matching’’,
(IDF(vj,b ) + βb ) to represent
P
sively calculates the value of each dimension in the index, ‘‘ranked search’’}, we use
_
and the processes are as follows. When a feature dj is exactly vj,b ∈W
the same as the document feature gi formed by extracting the value of the j-th dimension in query request q, where
_
W = {‘‘cloud computing’’, ‘‘ranked search’’}. In partial
match, with the help of FSA, this matching score algorithm
will give priority to returning documents with more matching
keywords.
In both algorithms, the values of IS and QS should be larger
than the highest score of partial match to ensure the ranking
accuracy. Generally, the larger the values of IS, QS, qα and
qβ are, the more accurate the query results. However, their
values should not be too large, because in this case, there is a
high risk of privacy leakage under Level2 model. In general,
when α ∈ (TF, 1), β ∈ (IF, 1), qα , qβ ∈ (1.2, 1.5), IS ∈
(α · (qα )M , α · (qα )M + 2TF) and QS ∈ (β · (qβ )M , β · (qβ )M +
2IF), the query results will achieve a good trade-off between
ranking accuracy and privacy protection. Where TF is the FIGURE 3. Time of generating trapdoor. For different number of
documents with the same query keywords t = 10.
maximum normalized term frequency in gi (i = 1, 2, . . . , m),
IF is the maximum normalized anti-term frequency in dj (j =
1, 2, . . . , n), M is the maximum number of keywords in
feature gi (i = 1, 2, . . . , m) or dj (j = 1, 2, . . . , n).
B. EXPERIMENTAL ANALYSIS
In this part, we evaluate the performance of our FMRSM
system using Java language on Windows 7 server with Intel
Core3 CPU 2.5GHz. We use Request for Comments database
(RFC) [42] as our dataset, and compare our mechanism with
MRSE (multi-keyword ranked search over encrypted cloud
data) [40] and CKSER (central keyword semantic extension
ranked scheme) [25].
The experimental process is as follows. In FMRSM,
we extract the keywords from each document to form the doc-
ument features, and filter duplicate features to construct the FIGURE 4. Time of query. For different number of documents with the
same query keywords t = 10.
feature dictionary. Then for MRSE and CKSER, we extract
the keywords from each document to form the keyword
dictionary. Finally, we perform five group of experiments,
including creating index, generating trapdoor, search, and
testing storage cost and accuracy. The experimental results
are shown in Figures 2, 3, 4, 5 and Table 2.
TABLE 2. Storage of subindex/trapdoor. [4] D. X. Song, D. Wagner, and A. Perrig, ‘‘Practical techniques for searches
on encrypted data,’’ in Proc. IEEE Symp. Secur. Privacy (S&P), Berkeley,
CA, USA, May 2000, pp. 44–55.
[5] A. J. Aviv, M. E. Locasto, S. Potter, and A. D. Keromytis, ‘‘SSARES:
Secure searchable automated remote email storage,’’ in Proc. 23rd Annu.
Comput. Secur. Appl. Conf. (ACSAC), Miami Beach, FL, USA, Dec. 2007,
pp. 129–139.
[6] M. Raykova, B. Vo, S. M. Bellovin, and T. Malkin, ‘‘Secure anonymous
database search,’’ in Proc. ACM Workshop Cloud Comput. Secur. (CCSW),
New York, NY, USA, 2009, pp. 115–126.
[7] S. M. Bellovin and W. R. Cheswick, ‘‘Privacy-enhanced searches using
When there are m documents, the largest dimension of the encrypted Bloom filters,’’ IACR Cryptol. ePrint Arch., Tech. Rep., 2004,
index and query request will be (m+u+1). Since the number vol. 22.
[8] Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, ‘‘Enabling personalized search
of keywords N extracted from the document is much greater over encrypted outsourced data with efficiency improvement,’’ IEEE
than the number of documents m, the time of creating index, Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546–2559, Sep. 2016.
generating trapdoor, and search for FMRSM is less than that [9] Z. Fu, X. Sun, Z. Xia, L. Zhou, and J. Shu, ‘‘Multi-keyword ranked search
supporting synonym query over encrypted data in cloud computing,’’
of MRSE and CKSER, as shown in figure 2, 3, and 4. It should in Proc. IEEE 32nd Int. Perform. Comput. Commun. Conf. (IPCCC),
be noted that since CKSER uses sub-matrices technology, the San Diego, CA, USA, Dec. 2013, pp. 1–8.
time of creating index, generating trapdoor, and search will be [10] H. Yin, Z. Qin, J. Zhang, W. Li, L. Ou, Y. Hu, and K. Li, ‘‘Secure conjunc-
tive multi-keyword search for multiple data owners in cloud computing,’’
less than MRSE. At the same time, comparing with MRSE in Proc. IEEE 22nd Int. Conf. Parallel Distrib. Syst. (ICPADS), Wuhan,
and CKSER, FMRSM saves the storage cost of the index and China, Dec. 2016, pp. 276–286.
trapdoor, as shown in Table 2. [11] Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, ‘‘Toward efficient multi-
keyword fuzzy search over encrypted outsourced data with accuracy
Another highlight of FMRSM is that it can improve the improvement,’’ IEEE Trans. Inf. Forensics Security, vol. 11, no. 12,
ranking accuracy. In the experiment, we calculate the rank- pp. 2706–2716, Dec. 2016.
ing accuracy according to the definition mentioned in E. [12] Z. Guo, H. Zhang, C. Sun, Q. Wen, and W. Li, ‘‘Secure multi-keyword
ranked search over encrypted cloud data for multiple data owners,’’ J. Syst.
Preliminaries, Section III. Figure 5 shows the relationship Softw., vol. 137, pp. 380–395, Mar. 2018.
between the ranking accuracy and the number of documents. [13] X. Jiang, J. Yu, J. Yan, and R. Hao, ‘‘Enabling efficient and verifiable multi-
It can be seen from the figure that FMRSM has better rank- keyword ranked search over encrypted cloud data,’’ Inf. Sci., vols. 403–404,
pp. 22–41, Sep. 2017.
ing accuracy than MRSE and CKSER. Therefore, for users’ [14] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, ‘‘Fuzzy keyword
query requests, FMRSM can return the search results that best search over encrypted data in cloud computing,’’ in Proc. IEEE INFO-
match user’s query requirements. COM, San Diego, CA, USA, Mar. 2010, pp. 1–5.
[15] M. A. M. Ahsan, F. Z. Chowdhury, M. Sabilah, A. W. B. A. Wahab, and
M. Y. I. B. Idris, ‘‘An efficient fuzzy keyword matching technique for
VI. CONCLUSION searching through encrypted cloud data,’’ in Proc. Int. Conf. Res. Innov.
Inf. Syst. (ICRIIS), Langkawi, Malaysia, Jul. 2017, pp. 1–5.
In this paper, we propose a novel feature matching ranked
[16] X. Zhu, Q. Liu, and G. Wang, ‘‘A novel verifiable and dynamic fuzzy
search mechanism for encrypted cloud data. In this mecha- keyword search scheme over encrypted data in cloud computing,’’ in Proc.
nism, a feature score algorithm is used to create indexes so IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, Aug. 2016, pp. 845–851.
that a plurality of keywords extracted from a document are [17] H. Zhu, Z. Mei, B. Wu, H. Li, and Z. Cui, ‘‘Fuzzy keyword search and
access control over ciphertexts in cloud computing,’’ in Proc. Australas.
only mapped to one dimension of the index. Comparing with Conf. Inf. Secur. Privacy. Cham, Switzerland: Springer, 2017, pp. 248–265.
creating indexes with independent keywords, this mechanism [18] Y. Tang, D. Gu, N. Ding, and H. Lu, ‘‘Phrase search over encrypted data
can reduce the index dimension. In addition, a matching with symmetric encryption scheme,’’ in Proc. 32nd Int. Conf. Distrib.
Comput. Syst. Workshops, Macau, China, 2012, pp. 471–480.
score algorithm is designed in the generating trapdoor process [19] E.-J. Goh, ‘‘es,’’ IACR Cryptol. ePrint Arch., Tech. Rep., 2003, p. 216.
of FMRSM. This algorithm can give the query request an [20] D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. Skeith, III, ‘‘Public key
accurate score based on the type of match and the number encryption that allows PIR queries,’’ in Proc. Annu. Int. Cryptol. Conf.
Berlin, Germany: Springer, 2007, pp. 50–67.
of matching keywords, so that the query results are more in [21] H. Cui, Z. Wan, R. Deng, G. Wang, and Y. Li, ‘‘Efficient and expressive
line with users’ actual search requests. It can be seen from keyword search over encrypted data in cloud,’’ IEEE Trans. Dependable
the experiment results that our mechanism can speed up the Secure Comput., vol. 15, no. 3, pp. 409–422, May/Jun.2016.
[22] F. S. Ali and S. Lu, ‘‘Searchable encryption with conjunctive field free
creation of index, the generation of trapdoor, and the search keyword search scheme,’’ in Proc. Int. Conf. Netw. Inf. Syst. Comput.
process. Moreover, our mechanism can save storage cost and (ICNISC), Wuhan, China, Apr. 2016, pp. 260–264.
improve the ranking accuracy. [23] Y. Yang and M. Ma, ‘‘Conjunctive keyword search with designated tester
and timing enabled proxy re-encryption function for e-health clouds,’’
IEEE Trans. Inf. Forensics Security, vol. 11, no. 4, pp. 746–759, Apr. 2017.
REFERENCES [24] F. Kerschbaum, ‘‘Secure conjunctive keyword searches for unstructured
text,’’ in Proc. 5th Int. Conf. Netw. Syst. Secur., Milan, Italy, Sep. 2011,
[1] Q. Chai and G. Gong, ‘‘Verifiable symmetric searchable encryption for pp. 285–289.
semi-honest-but-curious cloud servers,’’ in Proc. IEEE Int. Conf. Commun. [25] Z. Fu, X. Wu, Q. Wang, and K. Ren, ‘‘Enabling central keyword-based
(ICC), Ottawa, ON, Canada, Jun. 2012, pp. 917–922. semantic extension search over encrypted outsourced data,’’ IEEE Trans.
[2] X. Zhang, C. Xu, R. Xie, and C. Jin, ‘‘Designated cloud server public key Inf. Forensics Security, vol. 12, no. 12, pp. 2986–2997, Dec. 2017.
encryption with keyword search from lattice in the standard model,’’ Chin. [26] H. T. Poon and A. Miri, ‘‘An efficient conjunctive keyword and phase
J. Electron., vol. 27, no. 2, pp. 304–309, Mar. 2018. search scheme for encrypted cloud storage systems,’’ in Proc. IEEE 8th
[3] Y. Chang and M. Mitzenmacher, ‘‘Privacy preserving keyword searches on Int. Conf. Cloud Comput., New York, NY, USA, Jun. 2015, pp. 508–515.
remote encrypted data,’’ in Proc. Int. Conf. Appl. Cryptogr. Netw. Secur., [27] H. T. Poon and A. Miri, ‘‘Fast phrase search for encrypted cloud storage,’’
vol. 5. Berlin, Germany: Springer, 2005, pp. 442–455. IEEE Trans. Cloud Comput., vol. 7, no. 4, pp. 1002–1012, Oct. 2019.
[28] S. Zittrower and C. C. Zou, ‘‘Encrypted phrase searching in the cloud,’’ in [40] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ‘‘Privacy-preserving multi-
Proc. IEEE Global Commun. Conf. (GLOBECOM), Anaheim, CA, USA, keyword ranked search over encrypted cloud data,’’ IEEE Trans. Parallel
Dec. 2012, pp. 764–770. Distrib. Syst., vol. 25, no. 1, pp. 222–233, Jan. 2014.
[29] H. Yin, J. Zhang, Y. Xiong, L. Ou, F. Li, S. Liao, and K. Li, ‘‘CP-ABSE: [41] Z. Xia, X. Wang, X. Sun, and Q. Wang, ‘‘A secure and dynamic multi-
A ciphertext-policy attribute-based searchable encryption scheme,’’ IEEE keyword ranked search scheme over encrypted cloud data,’’ IEEE Trans.
Access, vol. 7, pp. 5682–5694, 2019. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.
[30] H. Yin, Z. Qin, J. Zhang, H. Deng, F. Li, and K. Li, ‘‘A fine-grained [42] Request for Comments Database. Accessed: Nov. 25, 2019. [Online].
authorized keyword secure search scheme with efficient search permis- Available: http://www.ietf.org/rfc.html
sion update in cloud computing,’’ J. Parallel Distrib. Comput., vol. 135,
pp. 56–69, Jan. 2020.
[31] H. Yin, Z. Qin, J. Zhang, L. Ou, F. Li, and K. Li, ‘‘Secure conjunctive
multi-keyword ranked search over encrypted cloud data for multiple data
owners,’’ Future Gener. Comput. Syst., vol. 100, pp. 689–700, Nov. 2019.
[32] J. Li, Y. Shi, and Y. Zhang, ‘‘Searchable ciphertext-policy attribute-based
LIANGGUI LIU received the Ph.D. degree in
encryption with revocation in cloud storage,’’ Int. J. Commun. Syst., vol. 30, communications and information system from the
no. 1, p. e2942, Jan. 2017. Nanjing University of Posts and Telecommunica-
[33] J. Li, X. Lin, Y. Zhang, and J. Han, ‘‘KSF-OABE: Outsourced attribute- tions, Nanjing, China, in 2007. He was a Visit-
based encryption with keyword search function for cloud storage,’’ IEEE ing Professor with Cornell University, Ithaca, NY,
Trans. Services Comput., vol. 10, no. 5, pp. 715–725, Sep. 2017. USA, and the University of Houston, Houston, TX,
[34] Y. Lu, J. Li, and Y. Zhang, ‘‘Secure channel free certificate-based USA. He is currently a Professor with the College
searchable encryption withstanding outside and inside keyword guessing of Information Science and Technology, Zhejiang
attacks,’’ IEEE Trans. Services Comput., early access, Apr. 11, 2019, doi: Shuren University, Hangzhou, China. His cur-
10.1109/TSC.2019.2910113. rent research interests include social computing,
[35] Y. Lu, J. Li, and Y. Zhang, ‘‘Privacy-preserving and pairing-free multire- network security, and natural computation.
cipient certificateless encryption with keyword search for cloud-assisted
IIoT,’’ IEEE Internet Things J., vol. 7, no. 4, pp. 2553–2562, Apr. 2020.
[36] C. Guo, X. Chen, Y. Jie, F. Zhangjie, M. Li, and B. Feng, ‘‘Dynamic
multi-phrase ranked search over encrypted data with symmetric searchable
encryption,’’ IEEE Trans. Services Comput., early access, Oct. 30, 2017,
doi: 10.1109/TSC.2017.2768045.
[37] C. Guo, S. Su, K.-K.-R. Choo, and X. Tang, ‘‘A fast nearest neighbor search
scheme over outsourced encrypted medical images,’’ IEEE Trans. Ind.
QIUXIA CHEN received the Ph.D. degree from the
Informat., early access, Nov. 27, 2018, doi: 10.1109/TII.2018.2883680. Department of Automation, Zhejiang University
[38] C. Guo, J. Jia, Y. Jie, C. Z. Liu, and K.-K.-R. Choo, ‘‘Enabling secure of Technology, Hangzhou, China, in 2011. She is
cross-modal retrieval over encrypted heterogeneous IoT databases with currently an Associate Professor with the College
collective matrix factorization,’’ IEEE Internet Things J., vol. 7, no. 4, of Information Science and Technology, Zhejiang
pp. 3104–3113, Apr. 2020. Shuren University, Hangzhou, China. Her current
[39] Z. A. Kissel and J. Wang, ‘‘Verifiable phrase search over encrypted data research interests include model predictive control
secure against a semi-honest-but-curious adversary,’’ in Proc. IEEE 33rd and network security.
Int. Conf. Distrib. Comput. Syst. Workshops, Philadelphia, PA, USA,
Jul. 2013, pp. 126–131.