Open Access Open Access  Restricted Access Subscription or Fee Access

Multikeyword Ranked Search over Cloud Data

T. Nagamani, Dr. B. Gomathy

Abstract


For greater flexibility, from local to commercial public cloud, data owners are stimulated to farm out their complex data management systems in cloud. Before outsourcing, Sensitive data has to be encrypted to protect data privacy which obsoletes traditional data exploitation based on plaintext keyword search. Thus, the main objective is enabling an encrypted cloud data search service. So, it is very important to allow multi-keyword query for the search service, while considering the large number of data users and documents in cloud, thus cloud computing is the long dreamed vision of computing as a utility, where cloud customers can vaguely store their data into the cloud so as to enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources.  Similarity ranking to meet the efficient data retrieval need. Related works are mainly focus on single keyword search or Boolean keyword search, and seldom differentiate the search results. Here, it is proposed a basic MRSE scheme using secure inner product computation, and then radically improve it by getting the different privacy requirements.

Keywords


Boolean Keyword, Cloud, Coordinate Matching, Encryption, Keyword Search, Information Retrieval, Ranked Search,

Full Text:

PDF

References


Jin Li, Qian Wang , Cong Wang, Ning Cao , Kui Ren , and Wenjing Lou " Fuzzy Keyword Search over Encrypted Data in Cloud Computing" IJERA transactions,Vol.2,Issue 2, Mar-Apr 2012.

Peng Xu and Hai Jin "Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack" IEEE transactions, Vol 62, Issue 11, Sep 2012.

Ning Cao,Cong Wang, Ming Li, Kui Ren,and WenjingLou "Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data" IEEE transactions on parallel and distributed systems, vol. 25, no. 1, January 2014.

Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu "Efficient Similarity Search over Encrypted Data" IJARCSSE transactions, Vol 2, Issue 10, Oct 2012.

Wei Zhang ,Sheng Xiao, Yaping Lin, Ting Zhou , Siwang Zhou " Secure Ranked Multi- keyword Search for Multiple Data Owners in Cloud Computing" IJETAE transactions,Vol 4,Issue 2,Feb 2014.

Zhiyong Xu ,Wansheng Kang , Ruixuan Li, Kinchoong Yow, Cheng-Zhong Xu " Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud" IEEE transactions,Vol 30,Issue 5,2012.

Jun Xu ,Weiming Zhang , Ce Yang Jiajia Xu , Nenghai Yu "Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data" IEEE transactions,Vol 13,Issue 6,Nov 2012.

P.A. Cabarcos, F.A. Mendoza, R.S. Guerrero, A.M Lopez, and D. Diaz- Sanchez,” SuSSo: seamless and ubiquitous single sign-on for cloud service" IEEE transactions, Vol11, Issue 7, Dec 2011.

Q. Chai, and G. Gong, “Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers” IEEE transactions, Vol 12,Issue 9,Oct 2013.

ZhirongShen,Jiwu Shu,Wei Xue "Preferred keyword search over encrypted data in cloud computing" IEEE transactions,Vol 1,Issue 8,Nov 2013.

Orencik C, Kantarcioglu M, Savas E. "A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data" IEEE transactions, Vol 4, Issue 7, Jan 2012.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,” Proc. IEEE INFOCOM, Mar. 2010.

T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,” Proc. 31st Int’l Conf. Distributed Computing Systems (ICDCS’10), pp. 383392, June 2011.

C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th International Conf. Distributed Computing Systems (ICDCS ’10), 2010.

L. Ballard, S. Kamara, and F. Monrose, “Achieving Efficient Conjunctive Keyword Searches over Encrypted Data,” Proc. Seventh International Conf. Information and Comm. Security (ICICS ’05), 2005.

M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous Ibe, and Extensions,” J. Cryptology, vol. 21, no. 3, pp. 350391, 2008.


Refbacks

  • There are currently no refbacks.