|Table of Contents|

Scheme of ciphertext retrieval in cloud based on ontology semantic expansion

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2015年04期
Page:
392-
Research Field:
Publishing date:

Info

Title:
Scheme of ciphertext retrieval in cloud based on ontology semantic expansion
Author(s):
Zhu BaopingZhang Jinkang
School of Computer Science and Engineering,NUST,Nanjing 210094,China
Keywords:
cloud storage ciphertext retrieval semantic expansion ontology data security index technology
PACS:
TP309.2
DOI:
-
Abstract:
To improve the precision of traditional ciphertext retrieval techniques,a scheme of ciphertext retrieval in cloud based on ontology semantic expansion is proposed.The scheme brings the ontology into ciphertext retrieval by building a hybrid cloud ciphertext retrieval model.The ontology concept structure is used to expand the query keyword semantically.The extended results are filtered by the semantic similarity so as to understand the intention of the user better.Experimental results show that the method can improve the accuracy of the search results while ensuring the retrieval speed.

References:

[1] 沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895.
Shen Zhirong,Xue Wei,Shu Jiwu.Survey on the research and development of searchable encryption schemes[J].Journal of Software,2014,25(4):880-895.
[2]Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[A].Proceedings of 2000 IEEE Symposium on Security and Privacy[C].Berkeley,CA,USA:IEEE,2000:44-55.
[3]Boneh D,Di Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[A].Advances in Cryptology-Eurocrypt 2004[C].Heidelberg,Germany:Springer,2004:506-522.
[4]Park D,Kim K,Lee P.Public key encryption with conjunctive field keyword search[A].Information Security Applications[C].Heidelberg,Germany:Springer,2005:73-86.
[5]Swaminathan A,Mao Y,Su G M,et al.Confidentiality-preserving rank-ordered search[A].Proceedings of the 2007 ACM Workshop on Storage Security and Surviv-ability[C].New York,USA:ACM,2007:7-12.
[6]Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[A].2010 IEEE 30th International Conference on Distributed Computing Systems(ICDCS)[C].Genoa,Italy:IEEE,2010:253-262.
[7]Lester N,Zobel J,Williams H.Efficient online index maintenance for text retrieval systems[J].Information Processing & Management,2006,42(4):59-65.
[8]黄名选,严小卫,张师超.查询扩展技术进展与展望[J].计算机应用与软件,2008,24(11):1-4.
Huang Mingxuan,Yan Xiaowei,Zhang Shichao.Review and perspective of queryexpansion techniques[J].Computer Applications and Software,2008,24(11):1-4.
[9]朱俊武,王建东,李斌.面向语义Web服务的本体及融合机制[J].南京理工大学学报,2007,30(6):742-747.
Zhu Junwu,Wang Jiandong,Li Bin.Ontology and its composition oriented to semantic Web Service[J].Journal of Nanjing University of Science and Technology,2007,30(6):742-747.
[10]Wu Z,Palmer M.Verbs semantics and lexical selection[A].Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics[C].Stroudsburg,PA,USA:Association for Computational Linguistics,1994:133-138.
[11]McCandless M,Hatcher E,Gospodnetic O.Lucene in action:Covers Apache Lucene 3.0[M].Greenwich,USA:Manning Publications Co,2010:160-163.

Memo

Memo:
-
Last Update: 2015-08-31