Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiangang Shu is active.

Publication


Featured researches published by Jiangang Shu.


IEEE Transactions on Parallel and Distributed Systems | 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

Zhangjie Fu; Kui Ren; Jiangang Shu; Xingming Sun; Fengxiao Huang

In cloud computing, searchable encryption scheme over outsourced data is a hot research field. However, most existing works on encrypted search over outsourced cloud data follow the model of “one size fits all” and ignore personalized search intention. Moreover, most of them support only exact keyword search, which greatly affects data usability and user experience. So how to design a searchable encryption scheme that supports personalized search and improves user search experience remains a very challenging task. In this paper, for the first time, we study and solve the problem of personalized multi-keyword ranked search over encrypted data (PRSE) while preserving privacy in cloud computing. With the help of semantic ontology WordNet, we build a user interest model for individual user by analyzing the users search history, and adopt a scoring mechanism to express user interest smartly. To address the limitations of the model of “one size fit all” and keyword exact search, we propose two PRSE schemes for different search intentions. Extensive experiments on real-world dataset validate our analysis and show that our proposed solution is very efficient and effective.


Journal of Internet Technology | 2015

Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing

Zhangjie Fu; Jiangang Shu; Jin Wang; Yu-Ling Liu; Sungyoung Lee

In recent years, due to the appealing features of cloud computing, more and more sensitive or private information has been outsourced onto the cloud. Although cloud computing provides convenience, privacy and security of data becomes a big concern. For protecting data privacy, it is desirable for the data owner to outsource sensitive data in encrypted form rather than in plain text. However, encrypted storage will hinder our legal access, e.g., searching function. To deal with this dilemma, a considerable number of searchable encryption schemes have been proposed in this field. However, almost all of existing schemes focus on keyword-based query rather than document-based query, which is a crucial requirement for real world application. In this paper, we propose a similarity search method for encrypted document based on simhash. Through our scheme, data users can find similar encrypted documents stored in cloud by submitting a query document. In order to scale well for large data sources, we build a triebased index to improve search efficiency in our solution. Through rigorous privacy analysis and experiment on realworld dataset, our scheme is secure and efficient.


IEEE Transactions on Consumer Electronics | 2014

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data

Zhangjie Fu; Jiangang Shu; Xingming Sun; Nigel Linge

With the increasing popularity of the pay-as-you- consume cloud computing paradigm, a large number of cloud services are pushed to consumers. One hand, it brings great convenience to consumers who use intelligent terminals; on the other hand, consumers are also facing serious difficulties that how to search the most suitable services or products from cloud. So how to enable a smart cloud search scheme is a critical problem in the consumer-centric cloud computing paradigm. For protecting data privacy, sensitive data are always encrypted before being outsourced. Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability. Moreover, these schemes do not support verifiability of search result. In order to save computation cost or download bandwidth, cloud server only conducts a fraction of search operation or return a part of result, which is viewed as selfish and semi-honest-but-curious. So, how to enhance flexibility of encrypted cloud data while supporting verifiability of search result is a big challenge. To tackle the challenge, a smart semantic search scheme is proposed in this paper, which returns not only the result of keyword-based exact match, but also the result of keyword-based semantic match. At the same time, the proposed scheme supports the verifiability of search result. The rigorous security analysis and performance analysis show that the proposed scheme is secure under the proposed model and effectively achieves the goal of keyword-based semantic search.


international workshop on digital watermarking | 2013

New Forensic Methods for OOXML Format Documents

Zhangjie Fu; Xingming Sun; Lu Zhou; Jiangang Shu

MS Office 2007–2013 documents, which use new Office Open XML (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes five forensic methods for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods are classified into two groups to describe the details: document structure and document format. The aim is to provide security detection technology for electronic documents downloaded by users, and then prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.


international conference on security and privacy in communication systems | 2014

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability

Zhangjie Fu; Jiangang Shu; Xingming Sun

With the increasing popularity of cloud computing, more and more sensitive or private information is being outsourced to cloud server. For protecting data privacy, sensitive data are always encrypted before being outsourced. Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability. Moreover, these schemes do not support verifiability of search result. To tackle the challenge, a smart semantic search scheme is proposed in this paper, which returns not only the result of keyword-based exact match, but also the result of keyword-based semantic match. At the same time, the proposed scheme supports the verifiability of search result.


intelligent information hiding and multimedia signal processing | 2014

A Similarity Search Method for Encrypted Cloud Document

Zhangjie Fu; Jiangang Shu; Jin Wang; Xingming Sun

The increasing popularity of cloud computing makes the data owner to outsource sensitive data in encrypted form onto the cloud. To tackle the problem of searching over encrypted cloud data, many keyword-based searchable encryption schemes have been proposed. However, there are few document-based search schemes in this field, which are also important in real applications. In this paper, we use the simhash algorithm to realizing similarity search over encrypted document with privacy-preserving. Through our method, data users can find similar encrypted documents stored in cloud by querying a document. In addition, a trie-based index is adopted in our solution to improve search efficiency.


IEICE Transactions on Communications | 2015

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing

Zhangjie Fu; Xingming Sun; Qi Liu; Lu Zhou; Jiangang Shu


international workshop on security | 2014

Semantic keyword search based on trie over encrypted cloud data

Zhangjie Fu; Jiangang Shu; Xingming Sun; Daxing Zhang


international performance computing and communications conference | 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing

Zhangjie Fu; Xingming Sun; Zhihua Xia; Lu Zhou; Jiangang Shu


cooperative information agents | 2014

Plain Text Zero Knowledge Watermarking Detection Based on Asymmetric Encryption

Zhangjie Fu; Xingming Sun; Jiangang Shu; Lu Zhou

Collaboration


Dive into the Jiangang Shu's collaboration.

Top Co-Authors

Avatar

Xingming Sun

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhangjie Fu

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Lu Zhou

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jin Wang

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhihua Xia

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Daxing Zhang

Hangzhou Dianzi University

View shared research outputs
Top Co-Authors

Avatar

Fengxiao Huang

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Qi Liu

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge