An Efficient Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Data in Cloud Computing

被引:0
作者
Ahmad, Shadab [1 ]
Kurnar, Pasupuleti Syam [2 ]
机构
[1] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, Andhra Pradesh, India
[2] IDRBT, Hyderabad, Andhra Pradesh, India
来源
2016 IEEE ANNUAL INDIA CONFERENCE (INDICON) | 2016年
关键词
Cloud Computing; data privacy; hierarchical clustering; LSI; MAC tree; Integrity;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IT industry is booming. So, the requirement for resources is also on the increase. Industry requires more processing power and storage capability to meet their goal. Here, Cloud Computing comes in the picture, it provides IT industry the much-needed resources on a large scale at low cost and makes their task easy. Organizations can easily outsource their huge amount of data to cloud storage. However, the privacy of data is a big concern. The data privacy can be achieved by encryption techniques, but it increases the difficulty of securely searching data on the cloud because searching in encrypted data is itself a challenging task. Recently many schemes have been proposed but these schemes do not consider the semantic of the query. We proposed a novel method by combining LSI and hierarchical cluster to get the semantic relation between the result and to reduce the search space respectively. Further, to verify the search result authenticity, we use MAC tree along with a cryptographic signature. Through security and performance analysis we prove that our method is better than previous encrypted searchable schemes.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2015, ENRON EMAIL DATA SET
[2]  
[Anonymous], 2011, NIST DEFINITION CLOU
[3]  
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[6]   An Efficient Privacy-Preserving Ranked Keyword Search Method [J].
Chen, Chi ;
Zhu, Xiaojie ;
Shen, Peisong ;
Hu, Jiankun ;
Guo, Song ;
Tari, Zahir ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) :951-963
[7]  
Hu HB, 2011, PROC INT CONF DATA, P601, DOI 10.1109/ICDE.2011.5767862
[8]  
Pang H., 2010, ACM T INTERNET TECHN, V10, DOI ACM
[9]   An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing [J].
Pasupuleti, Syam Kumar ;
Ramalingam, Subramanian ;
Buyya, Rajkumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 :12-22
[10]  
Paulsen Jon Rune, 2009, NORW S INF NIK FAGB