A Survey on Multi-Keyword Ranked Search Manipulations over Encrypted Cloud Data

被引:0
作者
Ponnusamy, P. Priya [1 ]
Vidhyapriya, R. [2 ]
Maheswari, S. Uma [3 ]
机构
[1] Sri Shakthi Inst Engn & Technol, CSE Dept, Coimbatore, Tamil Nadu, India
[2] PSG Coll Technol, CSE Dept, Coimbatore, Tamil Nadu, India
[3] Sri Shakthi Inst Engn & Technol, Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2017年
关键词
multi-keywords searching; ranked searching; efficient retrieval; cloud server; data outsourcing; SECURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, the advancements and the fame of cloud computing are increasing which is actuating the data owners to keep their personal and professional data on public cloud servers like Google, Apple, Yahoo, Amazon, Microsoft etc with the help of data outsourcing the organizations can provide reliable and efficient services to their users. The other advantage of outsourcing the data over cloud servers is for high benefit and lesser cost in managing the data and the data can be accessed from anywhere and at anytime. However, for privacy concerns, the data that are highly sensitive should be encrypted before outsourcing. Taking into consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server. In this survey, several searching techniques have been studied for the efficient retrieval of data or files or documents over the encrypted data.
引用
收藏
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2015, IEEE T PARALLEL DIST
[2]  
Bing Wang, 2014, IEEE INFOCO IN PRESS
[3]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[4]  
Cash D., 2014, P NDSS, V14
[5]  
Cong Wang, 2012, IEEE T PARALLEL DIST, V23
[6]   Secure conjunctive keyword search over encrypted data [J].
Golle, P ;
Staddon, J ;
Waters, B .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 :31-45
[7]   Efficient Similarity Search over Encrypted Data [J].
Kuzu, Mehmet ;
Islam, Mohammad Saiful ;
Kantarcioglu, Murat .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1156-1167
[8]  
Sun W., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, P71
[9]  
Wang B, 2014, IEEE INFOCOM SER, P2112, DOI 10.1109/INFOCOM.2014.6848153
[10]   Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data [J].
Wang, Cong ;
Cao, Ning ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) :1467-1479