Proceedings of the 2007 ACM Workshop on Storage Security and Survivability 2007
DOI: 10.1145/1314313.1314316
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality-preserving rank-ordered search

Abstract: This paper introduces a new framework for confidentiality preserving rank-ordered search and retrieval over large document collections. The proposed framework not only protects document/query confidentiality against an outside intruder, but also prevents an untrusted data center from learning information about the query and the document collection. We present practical techniques for proper integration of relevance scoring methods and cryptographic techniques, such as order preserving encryption, to protect da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 141 publications
(85 citation statements)
references
References 6 publications
0
85
0
Order By: Relevance
“…The computational cost of decrypting the data was wisely reduced. The author in [9] authorized data privacy systems. They defined t algorithms which depicts searching efficiency and privacy of the query.…”
Section: Related Workmentioning
confidence: 99%
“…The computational cost of decrypting the data was wisely reduced. The author in [9] authorized data privacy systems. They defined t algorithms which depicts searching efficiency and privacy of the query.…”
Section: Related Workmentioning
confidence: 99%
“…All these schemes do not provide any relevance of the documents in their search results. Although [6,25] provides a methodology to perform relevant searches over encrypted data, both of them fall in the category of static (SSSE) scheme.…”
Section: }))mentioning
confidence: 99%
“…Swaminathan et al [25] propose confidentially preserving rank order search. Their paper looks at practically building a ranking system into a secure index based search scheme.…”
Section: Related Kmentioning
confidence: 99%
“…Images are different from text. Only recently, secure text document search in the encrypted domain [8], [9] has been extended to secure multimedia data search [10], [11]. Although traditional cryptosystems may be used to encrypt images directly, it is not a good idea for two reasons.…”
Section: Figure1: Security Is a Big Issue In Cloud Computing [6]-[7]mentioning
confidence: 99%