
Semantic and secure search over encrypted outsourcing cloud based on BERT
Zhangjie FU, Yan WANG, Xingming SUN, Xiaosong ZHANG
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (2) : 162802.
Semantic and secure search over encrypted outsourcing cloud based on BERT
Searchable encryption provides an effective way for data security and privacy in cloud storage. Users can retrieve encrypted data in the cloud under the premise of protecting their own data security and privacy. However, most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the text. In this paper, we propose two secure and semantic retrieval schemes based on BERT (bidirectional encoder representations from transformers) named SSRB-1, SSRB-2. By training the documents with BERT, the keyword vector is generated to contain more semantic information of the documents, which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s intention. Finally, through testing on real data sets, it is shown that both of our solutions are feasible and effective.
cloud computing / semantic search / BERT model / searchable encryption
[1] |
Wang C , Yuan X , Cui Y , Ren K . Toward secure outsourced middlebox services: practices, challenges, and beyond. IEEE Network, 2017, 32( 1): 166– 171
|
[2] |
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy. 2000, 44−55
|
[3] |
Swaminathan A, Mao Y, Su G M, Gou H, Varna, A L, He S, Wu M, Oard D W. Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage Security and Survivability. 2007, 7−12
|
[4] |
Wang C, Cao N, Li J, Ren K, Lou W. Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th IEEE international conference on distributed computing systems. 2010, 253-262
|
[5] |
Li J , Chen X , Xhafa F , Barolli L . Secure deduplication storage systems supporting keyword search. Journal of Computer and System Sciences, 2015, 81( 8): 1532– 1541
CrossRef
Google scholar
|
[6] |
Li R , Xu Z , Kang W , Yow K C , Xu C Z . Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Generation Computer Systems, 2014, 30
CrossRef
Google scholar
|
[7] |
Zhang M , Chen Y , Huang J . SE-PPFM: A Searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in Cloud Systems. IEEE Systems Journal, 2020, 15( 2): 2980– 2988
|
[8] |
Hu S , Wang Q , Wang J , Qin Z , Ren K . Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Transactions on Image Processing, 2016, 25( 7): 3411– 3425
CrossRef
Google scholar
|
[9] |
Yuan X , Wang X , Wang C , Squicciarini A C , Ren K . Towards privacy-preserving and practical image-centric social discovery. IEEE Transactions on Dependable and Secure Computing, 2016, 15( 5): 868– 882
|
[10] |
Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption. In: Proceeding of International Conference on Financial Cryptography and Data Security. 2013, 258−274
|
[11] |
Miers I, Mohassel P. IO-DSSE: scaling dynamic searchable encryption to millions of indexes by improving locality. In: Proceeding of NDSS. 2017
|
[12] |
Liu Y , Peng H , Wang J . Verifiable diversity ranking search over encrypted outsourced data. Computers, Materials & Continua, 2018, 55( 1): 37– 57
|
[13] |
Duan H, Wang C, Yuan X, Zhou Y, Wang Q, Ren K. LightBox: full-stack protected stateful middlebox at lightning speed. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019, 2351−2367
|
[14] |
Fu Z , Sun X , Liu Q , Zhou L , Shu J G . Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communication, 2015, 98( 1): 190– 200
|
[15] |
Wang B, Yu S, Lou W, Hou Y T. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications. 2014, 2112−2120
|
[16] |
Goh E J . Secure indexes. IACR Cryptol. ePrint Arch., 2003, 2003
|
[17] |
Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceeding of the 13th ACM Conference on Computer and Communications Security. 2006, 79−88
|
[18] |
Cao N , Wang C , Li M , Ren K , Lou W . Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2013, 25( 1): 222– 233
|
[19] |
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th Conference on Information Communications. 2010, 441−445
|
[20] |
Fu Z , Shu J , Sun X , Linge N . Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Transactions on Consumer Electronics, 2014, 60( 4): 762– 770
CrossRef
Google scholar
|
[21] |
Wang Q , He M , Du M , Chow S S M , Lai R W F , Zou Q . Searchable encryption over feature-rich data. IEEE Transactions on Dependable and Secure Computing, 2018, 15( 3): 496– 510
CrossRef
Google scholar
|
[22] |
Xu L, Yuan X, Wang C, Wang Q, Xu C. Hardening database padding for searchable encryption. In: Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019, 2503−2511
|
[23] |
Fu Z , Huang F , Ren K , Weng J , Wang C . Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Information Forensics and Security, 2017, 12( 8): 1874– 1884
CrossRef
Google scholar
|
[24] |
Liu Y , Fu Z . Secure search service based on word2vec in the public cloud. International Journal of Computational Science and Engineering, 2019, 18( 3): 305– 313
CrossRef
Google scholar
|
[25] |
Zerr S, Demidova E, Olmedilla D, Nejdl W, Winslett, M, Mitra S. Zerber: r-confidential indexing for distributed documents. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology. 2008, 287−298
|
[26] |
Devlin J, Chang M W, Lee K, Toutanova K. Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2019, 4171−4186
|
[27] |
Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez A N, Kaiser L, Polosukhin I. Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017, 5998−6008
|
[28] |
Wong W K, Cheung D W, Kao B, Mamoulis N. Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. 2009, 139−152
|
/
〈 |
|
〉 |