Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Preserving Similarity-based Text Retrieval through Blind Storage in Cloud

N. Ananth Rao, U. Deepak Shankar, S. Gowtham Pradeep, MR. Jeyamohan


An efficient and reliable methodology for search over encrypted data which is splited in to multiple blocks and then stored in blind storage. Here the encrypted multi keyword search pre computes the resulting search documents for the input query from users through Natural language processing Technique which is implemented on gateway (client side) on user file upload. The matching documents which is pre compute the before searching the encrypted cloud contents are retrieved from cloud. Here we does not pull all the encrypted data’s from cloud for searching, which is time consuming and ineffective. The matching documents memory locations on blind storage are retrieved from the serializable objects which is stored in the gateway. User can download the resulting documents after getting the keys from the group owner. User can upload the files in public and private mode.


Cloud Computing, Searchable Encryption, Multi- Keyword Ranked Search, Group Owners, Query Result, Access Control

Full Text:



R. Ostrovsky and W. Skeith III, “Private searching on streaming data,” in Proc. of ACM CRYPTO, 2005.

J. Bethencourt, D. Song, and B. Waters, “New techniques for private stream searching,” ACM Transactions on Information and System Security, 2009.

Q. Liu, C. C. Tan, J. Wu, and G. Wang, “Cooperative private searching in clouds,” http: // cctan/TR1.pdf, Tech. Rep., 2011.9.

G. Danezis and C. Diaz, “Improving the decoding efficiency of private search,” in IACR Eprint archive number 024, 2006.

C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of IEEE ICDCS, 2010.

A. Boldyreva, N. Chenette, Y. Lee, and A. Oneill, “Order-preserving symmetric encryption,” Advances in Cryptology- EUROCRYPT, 2009.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multikeyword ranked search over encrypted cloud data,” in Proc. Of IEEE INFOCOM, 2011.

W. Wong, D. Cheung, B. Kao, and N. Mamoulis, “Secure knn computation on encrypted databases,” in Proc. of ACM SIGMOD, 2009.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of ACM CCS, 2006.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.