Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data

Xuelong Dai, Hua Dai, Chunming Rong, Geng Yang, Fu Xiao, Bin Xiao

Research output: Journal article publicationJournal articleAcademic researchpeer-review

12 Citations (Scopus)

Abstract

Traditional searchable encryption schemes based on the Term Frequency-Inverse Document Frequency (TF-IDF) model adopt the presence of keywords to measure the relevance of documents to queries, which ignores the latent semantic meanings that are concealed in the context. Latent Dirichlet Allocation (LDA) topic model can be utilized for modeling the semantics among texts to achieve semantic-aware multi-keyword search. However, the LDA topic model treats queries and documents from the perspective of topics, and the keywords information is ignored. In this article, we propose a privacy-preserving searchable encryption scheme based on the LDA topic model and the query likelihood model. We extract the feature keywords from the document using the LDA-based Information Gain (IG) and Topic Frequency-Inverse Topic Frequency (TF-ITF) model. With feature keyword extraction and the query likelihood model, our scheme can achieve a more accurate semantic-aware keyword search. A special index tree is used to enhance search efficiency. The secure inner product operation is utilized to implement the privacy-preserving ranked search. The experiments on real-world datasets demonstrate the effectiveness of our scheme.

Original languageEnglish
Pages (from-to)2595-2612
Number of pages18
JournalIEEE Transactions on Cloud Computing
Volume10
Issue number4
DOIs
Publication statusPublished - 1 Oct 2022

Keywords

  • cloud computing
  • multi-keyword ranked search
  • searchable encryption
  • Semantic-aware search

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data'. Together they form a unique fingerprint.

Cite this