Semantic and secure search over encrypted outsourcing cloud based on BERT
Zhangjie FU , Yan WANG , Xingming SUN , Xiaosong ZHANG
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (2) : 162802
Semantic and secure search over encrypted outsourcing cloud based on BERT
Searchable encryption provides an effective way for data security and privacy in cloud storage. Users can retrieve encrypted data in the cloud under the premise of protecting their own data security and privacy. However, most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the text. In this paper, we propose two secure and semantic retrieval schemes based on BERT (bidirectional encoder representations from transformers) named SSRB-1, SSRB-2. By training the documents with BERT, the keyword vector is generated to contain more semantic information of the documents, which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s intention. Finally, through testing on real data sets, it is shown that both of our solutions are feasible and effective.
cloud computing / semantic search / BERT model / searchable encryption
| [1] |
|
| [2] |
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy. 2000, 44−55 |
| [3] |
Swaminathan A, Mao Y, Su G M, Gou H, Varna, A L, He S, Wu M, Oard D W. Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage Security and Survivability. 2007, 7−12 |
| [4] |
Wang C, Cao N, Li J, Ren K, Lou W. Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th IEEE international conference on distributed computing systems. 2010, 253-262 |
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
Kamara S, Papamanthou C. Parallel and dynamic searchable symmetric encryption. In: Proceeding of International Conference on Financial Cryptography and Data Security. 2013, 258−274 |
| [11] |
Miers I, Mohassel P. IO-DSSE: scaling dynamic searchable encryption to millions of indexes by improving locality. In: Proceeding of NDSS. 2017 |
| [12] |
|
| [13] |
Duan H, Wang C, Yuan X, Zhou Y, Wang Q, Ren K. LightBox: full-stack protected stateful middlebox at lightning speed. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019, 2351−2367 |
| [14] |
|
| [15] |
Wang B, Yu S, Lou W, Hou Y T. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications. 2014, 2112−2120 |
| [16] |
|
| [17] |
Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceeding of the 13th ACM Conference on Computer and Communications Security. 2006, 79−88 |
| [18] |
|
| [19] |
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th Conference on Information Communications. 2010, 441−445 |
| [20] |
|
| [21] |
|
| [22] |
Xu L, Yuan X, Wang C, Wang Q, Xu C. Hardening database padding for searchable encryption. In: Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019, 2503−2511 |
| [23] |
|
| [24] |
|
| [25] |
Zerr S, Demidova E, Olmedilla D, Nejdl W, Winslett, M, Mitra S. Zerber: r-confidential indexing for distributed documents. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology. 2008, 287−298 |
| [26] |
Devlin J, Chang M W, Lee K, Toutanova K. Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2019, 4171−4186 |
| [27] |
Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez A N, Kaiser L, Polosukhin I. Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017, 5998−6008 |
| [28] |
Wong W K, Cheung D W, Kao B, Mamoulis N. Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. 2009, 139−152 |
Higher Education Press
/
| 〈 |
|
〉 |