EMSRSE: Efficient Multi-Keyword Synonym Based Ranked Search Technique Over Outsourced Encrypted Cloud Data

  • Authors

    • Veerraju Gampala
    • Sreelatha Malempati
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.36.24232
  • Cloud computing, multi-keyword search, synonym-based search, index search tree, ranked search.
  • Recently, searching over encrypted cloud-data outsourcing has attracted the current researcher. Using cloud computing (CC), individuals and organizations are motivated to outsource their private and sensitive data onto the cloud service provider (CSP) due to less maintenance cost, great flexibility, and ease of access.  However, the data should be encrypted using encryption techniques such as DES and AES before uploading to the CSP in order to provide data privacy and protection, which obsolete plaintext searching techniques over encrypted cloud data. Thus, this article proposes an efficient multi-keyword synonym-based ranked searching technique over encrypted cloud data (EMSRSE), which supports dynamic insertion and deletion of documents. The main objectives of EMSRSE are 1. To build an index search tree in order to store encrypted index vectors of documents and 2. To achieve better searching efficiency, a searching technique over the encrypted index tree is proposed. An extensive research and empirical result analysis show that the proposed EMSRSE scheme achieves better efficiency in comparison with other existing methods.

     

     

  • References

    1. [1] Mell P & Grance T, The NIST definition of cloud computing, NIST special publication, (2011).

      [2] Gampala V, Inuganti S & Muppidi S, “Data security in cloud computing with elliptic curve cryptographyâ€, International Journal of Soft Computing and Engineering (IJSCE), Vol.2, No.3, (2012), pp.138-141.

      [3] Song DX, Wagner D & Perrig A, “Practical techniques for searches on encrypted dataâ€, IEEE Symposium on Security and Privacy, (2000), pp.44-55.

      [4] Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z & Zomaya AY, “An efficient privacy-preserving ranked keyword search methodâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.27, No.4, (2016), pp.951-963.

      [5] Li H, Liu D, Dai Y, Luan TH & Shen XS, “Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storageâ€, IEEE Transactions on Emerging Topics in Computing, Vol.3, No.1, (2015), pp.127-138.

      [6] Xia Z, Wang X, Sun X & Wang Q, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Dataâ€, IEEE Trans. Parallel Distrib. Syst., Vol.27, No.2, (2016), pp.340-352.

      [7] Miller GA, “WordNet: a lexical database for Englishâ€, Communications of the ACM, Vol.38, No.11, (1995), pp.39-41.

      [8] Wong WK, Cheung DWL, Kao B & Mamoulis, N, “Secure knn computation on encrypted databasesâ€, International Conference on ACM SIGMOD Management of data, (2009), pp.139-152.

      [9] Li J, Wang Q, Wang C, Cao N, Ren K & Lou W, “Fuzzy keyword search over encrypted data in cloud computingâ€, Proceedings of IEEE Infocom, (2010), pp.1-5.

      [10] Wang C, Cao N, Li J, Ren K & Lou W, “Secure ranked keyword search over encrypted cloud dataâ€, IEEE 30th International Conference on Distributed Computing Systems (ICDCS), (2010), pp.253-262.

      [11] Cao N, Wang C, Li M, Ren K & Lou W, “Privacy-preserving multi-keyword ranked search over encrypted cloud dataâ€, IEEE Transactions on parallel and distributed systems, Vol.25, No.1, (2014), pp.222-233.

      [12] Li R, Xu Z, Kang W, Yow KC & Xu CZ, “Efficient multi-keyword ranked query over encrypted data in cloud computingâ€, Future Generation Computer Systems, Vol.30, (2014), pp.179-190.

      [13] Goh EJ, “Secure indexesâ€, IACR Cryptology ePrint Archive, (2003).

      [14] Chang YC & Mitzenmacher M, “Privacy preserving keyword searches on remote encrypted dataâ€, International Conference on Applied Cryptography and Network Security, (2005), pp. 442-455.

      [15] Curtmola R, Garay J, Kamara S & Ostrovsky R, “Searchable symmetric encryption: improved definitions and efficient constructionsâ€, Journal of Computer Security, Vol.19, No.5, (2011), pp.895-934.

      [16] Xia Z, Zhu Y, Sun X & Chen L, “Secure semantic expansion based search over encrypted cloud data supporting similarity rankingâ€, Journal of Cloud Computing, Vol.3, No.1, (2014).

      [17] Fu Z, Ren K, Shu J, Sun X & Huang F, “Enabling personalized search over encrypted outsourced data with efficiency improvementâ€, IEEE transactions on parallel and distributed systems, Vol.27, No.9, (2016), pp.2546-2559.

      [18] Zhangjie F, Xingming S, Nigel L & Lu Z, “Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Queryâ€, IEEE Trans. Consumer Electronics, Vol.60, No.1, (2014), pp.164-172.

      [19] Veerraju G & Sreelatha M, “A Study on Privacy Preserving Searching Approaches on Encrypted Data and Open Challenging Issues in Cloud Computingâ€, International Journal of Computer Science and Information Security, Vol.14, No.12, (2016), pp.294-307.

      [20] Boldyreva A, Chenette N, Lee Y & Oneill A, “Order-preserving symmetric encryptionâ€, Advances in Cryptology-EUROCRYPT, Springer, (2009), pp.224–241.

      [21] Sun W, Wang B, Cao N, Li M, Lou W, Hou YT & Li H, “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based rankingâ€, 8th ACM SIGSAC symposium on Information, computer and communications security, (2013), pp.71-82.

      [22] Yu J, Lu P, Zhu Y, Xue G & Li M. Towards secure multi-keyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, Vol.10, No.4, (2013), pp.239–250.

      [23] Schütze H, Manning, CD & Raghavan P. Introduction to information retrieval. Cambridge University Press, Vol.39, (2008).

      [24] National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, Washington, DC, USA, 1977.

      [25] Dobbertin H & Rijmen V, Advanced Encryption Standard-AES: 4th International Conference, AES 2004, Bonn, Germany, Revised Selected and Invited Papers, Springer Science & Business Media, (2005).

      [26] Zobel J & Moffat A, “Exploring the similarity spaceâ€, ACM SIGIR Forum, Vol.32, No.1, (1998), pp.18–34.

      [27] Veerraju G & Sreelatha M, “Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Dataâ€, International Journal of Engineering and Technology, Vol.8, No.1, (2016), pp. 98-107.

      [28] Request for comments, (2014).

      [29] National Science Foundation Research Awards Abstracts 1990-2003.

  • Downloads

  • How to Cite

    Gampala, V., & Malempati, S. (2018). EMSRSE: Efficient Multi-Keyword Synonym Based Ranked Search Technique Over Outsourced Encrypted Cloud Data. International Journal of Engineering & Technology, 7(4.36), 736. https://doi.org/10.14419/ijet.v7i4.36.24232