Abstract

The fast development of cloud technology has brought about a new trend in the field of information service: more and more information is being transferred to the cloud as requested. However, the data, such as texts, images, sounds, and videos, before being moved to the cloud, in most cases, has to be encrypted so that intelligible information will not be obtained from unauthorized accesses. While having done a nice work in protecting the data privacy of its owners, this encrypting process, has produced a great challenge for retrieval of the document stored via traditional IR model based on document, query and relevance. In order to retrieve encrypted information from cloud, an alternative retrieval system is needed. To satisfy such a need, we have: 1) build a cloud information retrieval framework characterized by its retrieval risk formula, which, enables, for the very first time to the best of our knowledge, an effective retrieval of keywords from encrypted cloud data without undermining key word privacy and retrieval performance; and 2) upgraded the existing searchable encryption scheme that can only support simple equality queries on encrypted data and has been proved to perform slightly better than random selection, so that it can now support the state-of-art information retrieval methods, such as vector space, probabilistic, and language model. To evaluate the effect of the system proposed above, we've conducted a wide range of experiments on benchmark data sets, of which the results shows that solution can fulfill its purposes quite well in various settings.

Original languageEnglish (US)
Pages (from-to)15420-15430
Number of pages11
JournalIEEE Access
Volume6
DOIs
StatePublished - Jan 29 2018

Fingerprint

Information retrieval
Data privacy
Information services
Vector spaces
Cryptography
Acoustic waves
Experiments

Keywords

  • cloud computing
  • extraction
  • Information retrieval
  • query expansion
  • searchable encryption

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Cite this

Cloud Information Retrieval : Model Description and Scheme Design. / Yang, Zhen; Tang, Jiliang; Liu, Huan.

In: IEEE Access, Vol. 6, 29.01.2018, p. 15420-15430.

Research output: Contribution to journalArticle

Yang, Zhen ; Tang, Jiliang ; Liu, Huan. / Cloud Information Retrieval : Model Description and Scheme Design. In: IEEE Access. 2018 ; Vol. 6. pp. 15420-15430.
@article{78a8bd711ab84d148f9467ecbdbc6b4a,
title = "Cloud Information Retrieval: Model Description and Scheme Design",
abstract = "The fast development of cloud technology has brought about a new trend in the field of information service: more and more information is being transferred to the cloud as requested. However, the data, such as texts, images, sounds, and videos, before being moved to the cloud, in most cases, has to be encrypted so that intelligible information will not be obtained from unauthorized accesses. While having done a nice work in protecting the data privacy of its owners, this encrypting process, has produced a great challenge for retrieval of the document stored via traditional IR model based on document, query and relevance. In order to retrieve encrypted information from cloud, an alternative retrieval system is needed. To satisfy such a need, we have: 1) build a cloud information retrieval framework characterized by its retrieval risk formula, which, enables, for the very first time to the best of our knowledge, an effective retrieval of keywords from encrypted cloud data without undermining key word privacy and retrieval performance; and 2) upgraded the existing searchable encryption scheme that can only support simple equality queries on encrypted data and has been proved to perform slightly better than random selection, so that it can now support the state-of-art information retrieval methods, such as vector space, probabilistic, and language model. To evaluate the effect of the system proposed above, we've conducted a wide range of experiments on benchmark data sets, of which the results shows that solution can fulfill its purposes quite well in various settings.",
keywords = "cloud computing, extraction, Information retrieval, query expansion, searchable encryption",
author = "Zhen Yang and Jiliang Tang and Huan Liu",
year = "2018",
month = "1",
day = "29",
doi = "10.1109/ACCESS.2018.2797131",
language = "English (US)",
volume = "6",
pages = "15420--15430",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - Cloud Information Retrieval

T2 - Model Description and Scheme Design

AU - Yang, Zhen

AU - Tang, Jiliang

AU - Liu, Huan

PY - 2018/1/29

Y1 - 2018/1/29

N2 - The fast development of cloud technology has brought about a new trend in the field of information service: more and more information is being transferred to the cloud as requested. However, the data, such as texts, images, sounds, and videos, before being moved to the cloud, in most cases, has to be encrypted so that intelligible information will not be obtained from unauthorized accesses. While having done a nice work in protecting the data privacy of its owners, this encrypting process, has produced a great challenge for retrieval of the document stored via traditional IR model based on document, query and relevance. In order to retrieve encrypted information from cloud, an alternative retrieval system is needed. To satisfy such a need, we have: 1) build a cloud information retrieval framework characterized by its retrieval risk formula, which, enables, for the very first time to the best of our knowledge, an effective retrieval of keywords from encrypted cloud data without undermining key word privacy and retrieval performance; and 2) upgraded the existing searchable encryption scheme that can only support simple equality queries on encrypted data and has been proved to perform slightly better than random selection, so that it can now support the state-of-art information retrieval methods, such as vector space, probabilistic, and language model. To evaluate the effect of the system proposed above, we've conducted a wide range of experiments on benchmark data sets, of which the results shows that solution can fulfill its purposes quite well in various settings.

AB - The fast development of cloud technology has brought about a new trend in the field of information service: more and more information is being transferred to the cloud as requested. However, the data, such as texts, images, sounds, and videos, before being moved to the cloud, in most cases, has to be encrypted so that intelligible information will not be obtained from unauthorized accesses. While having done a nice work in protecting the data privacy of its owners, this encrypting process, has produced a great challenge for retrieval of the document stored via traditional IR model based on document, query and relevance. In order to retrieve encrypted information from cloud, an alternative retrieval system is needed. To satisfy such a need, we have: 1) build a cloud information retrieval framework characterized by its retrieval risk formula, which, enables, for the very first time to the best of our knowledge, an effective retrieval of keywords from encrypted cloud data without undermining key word privacy and retrieval performance; and 2) upgraded the existing searchable encryption scheme that can only support simple equality queries on encrypted data and has been proved to perform slightly better than random selection, so that it can now support the state-of-art information retrieval methods, such as vector space, probabilistic, and language model. To evaluate the effect of the system proposed above, we've conducted a wide range of experiments on benchmark data sets, of which the results shows that solution can fulfill its purposes quite well in various settings.

KW - cloud computing

KW - extraction

KW - Information retrieval

KW - query expansion

KW - searchable encryption

UR - http://www.scopus.com/inward/record.url?scp=85041404854&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85041404854&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2018.2797131

DO - 10.1109/ACCESS.2018.2797131

M3 - Article

VL - 6

SP - 15420

EP - 15430

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

ER -