A PRIVACY AND DYNAMIC MULTI-KEYWORDS RANKED SEARCH SCHEME OVER CLOUD DATA ENCRYPTED

G. Kavitha, K Surendra Reddy

Abstract


Cloud computing is emergent discipline as a new computing model in a number of trade domains. Enormous numbers of colossal-scale businesses are starting to shift the data on to the cloud environment. The proposed multi key word search based on rating over encrypted cloud data uses feature of similarity and inner product similarity matching. The vector space model helps to provide enough search accuracy and homomorphic encryption permits clients to contain in ranking whereas majority of computing work is done on server part by using operations only on cipher textual content. As a consequence in this system for top-k retrieval user gets an interested/used link in top.


Keywords


Searchable Encryption; Multi-Keyword Ranked Search; Inner Product;

References


S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. 14th Int’l Conf. Financial Cryptography and Data Security, Jan. 2010.

Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, 2015.

R. Curtmola, "Searchable symmetric encryption: improved definitions and efficient constructions",Proceedings of the 13th ACM conference on Computer and communications security, ACM, (2006).

D.X.Song, D. Wagner and A.Perrig,"Practical techniques for searches on encrypted data. in Security and Privacy", 2000. S&P 2000, Proceedings 2000 IEEE Symposium, IEEE, (2000).

C. Wang, "Secure ranked keyword search over encrypted cloud data”, Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference, IEEE, (2010).

C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling secure and efficient ranked keyword search over outsourced cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 8, pp. 1467–1479, 2012.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in IEEE INFOCOM, April 2011, pp. 829–837.

W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 2013, pp. 71–82.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.