Open Access Open Access  Restricted Access Subscription or Fee Access

Authenticating Ranked Keyword Search and Supporting Score Dynamics

S.P. Ramya, G. Alaiyarasi

Abstract


Cloud computing enables the user to remotely store their data over cloud. It economically enables the paradigm of data service outsourcing. For protecting data privacy sensitive cloud data have to be encrypted before outsourced into cloud. Traditionally, Boolean search technique is used for file retrieval. But it is not sufficient to meet effective data utilization. The problem of efficient ranked keyword search over encrypted cloud solved. The ranked search is done by Ranked searchable symmetric encryption scheme (RSSE). We explore the relevance score approach to build a searchable index which is used for easily identifying user interested keyword. We investigate, score dynamics when the content of the file be changed.

Keywords


Ranked Search, Searchable Encryption, Order-Preserving Mapping, Confidential Data, Cloud Computing.

Full Text:

PDF

References


C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf.Distributed Computing Systems (ICDCS ’10), 2010.

P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 8, AUGUST 2012

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009. Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing,” Boldyreva, N. Chenette, Y. Lee, and A. O’Neill, “Order-Preserving Symmetric Encryption,” Proc. Int’l Conf. Advances in Cryptology (Euro crypt ’09), 2009.

M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and Efficiently Searchable Encryption,” Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology (Crypto ’07), 2007.

R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “SearchableSymmetric Encryption: Improved Definitions and Efficient Constructions,”Proc. ACM Conf. Computer and Comm. Security (CCS ’06), 2006.

D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” Proc. IEEE Symp. Security and Privacy, 2000.

E.-J. Goh, “Secure Indexes,” Technical Report 2003/216, Cryptology ePrint Archive, http://eprint.iacr.org/, 2003.

D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, “PublicKey Encryption with Keyword Search,” Proc. Int’l Conf. Advances in Cryptology (EUROCRYP ’04), 2004.

Y.-C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” Proc. Int’l Conf. Applied Cryptography and Network Security (ACNS ’05), 2005.

R.Curtmola J.A.Garay,S.kamara and R.Ostrovsky,”Searchable Symmetric Encryption :Improved Definitions and Efficient Construction,”Proc.ACM Conf .Computer and Comm.Security (CCS’ 06) 2006.

L.Ballard, S.Kamara, and F.Monrose, “Achieving Efficient Conjunctive Keyword Searches over Encrypted Data,” Proc. Int’l Conf. Information and Comm. Security (ICICS’05), 2005.

F. Boa, R. Deng, X. Ding, and Y. Yang, “Private Query on Encrypted Data in Multi-User Settings,” Proc. Int’l Conf. Information Security Practice and Experience (ISPEC ’08), 2008.

Y.-C. Chang and M. Mitzenmacher,“Privacy Preserving Keyword Searches on Remote Encrypted Data,” Proc. Int Conf. Applied Cryptography and Network Security(ACNS ’05), 2005.

Cong Wang, Student Member, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”Ning Cao,Student Member, IEEE, KuiRen Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE.

R.Curtmola, J.A.Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,”Proc.ACM Conf.Computer and Comm. Security (CCS ’06), 2006.

E.-J. Goh, “Secure Indexes,” Technical Report 2003/216, Cryptology ePrint Archive,2003.

P. Golle, J. Staddon, and B.R. Waters, “Secure Conjunctive Keyword Search over Encrypted Data,” Proc. Second Int’l Conf. Applied Cryptography and Network Security (ANCS ’04), pp. 31-45, 2004.

L. Ballard, S. Kamara, and F. Monrose, “Achieving Efficient Conjunctive Keyword Searches over Encrypted Data,” Proc. Int’l Conf. Information and Comm. Security (ICICS ’05), 2005.

Y.H. Hwang and P.J. Lee, “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System,” Proc. Int’l Conf. Pairing-Based Cryptography (Pairing ’07), pp. 31-45, 2007.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search over Encrypted Data in Cloud Computing,” Proc. IEEE INFOCOM ’10, 2010.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving ulti-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM ’11, 2011.

D. Boneh and B. Waters, “Conjunctive, Subset, and Range Queries on Encrypted Data,” Proc. Fourth Conf. Theory of Cryptography (TCC ’07), pp. 535-554, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.