Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data

被引:5
作者
Sathyabalaji, N. [1 ]
Komarasamy, G. [2 ]
Raja, Daniel Madan S. [3 ]
机构
[1] Bannari Amman Inst Technol, Dept CSE, Sathyamangalam, India
[2] Jain Univ, Dept CSE, Bengaluru, India
[3] Bannari Amman Inst Technol, Dept Informat Technol, Sathyamangalam, India
关键词
cloud computing; cloud server; data owner; data users; hashed encrypted document; index tree; keyword-based search; ALGORITHM;
D O I
10.1002/dac.4274
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing (CC) is the universal area in which the data owners will contract out their pertinent data to the untrusted public cloud that permits the data users to retrieve the data with complete integrity. To give data privacy along with integrity, majority of the research works were concentrated on single data owner for secure searching of encrypted data via the cloud. Also, searchable encryption supports data user to retrieve the particular encrypted document from encrypted cloud data via keyword search (KS). However, these researches are not efficient for keyword search retrieval. To trounce such drawbacks, this paper proposes efficient secure and privacy-preserving keyword search retrieval (SPKSR) system, in which the user retrieves the hashed encrypted documents over hashed encrypted cloud data. The proposed system includes three entities explicitly, (a) data owner (DO), (b) cloud server (CS), and (c) data users (DU). The owner outsources hashed encrypted documents set, along with generated searchable index tree to the CS. The CS hoards the hashed encrypted document collection and index tree structure. DU performs the "search" over the hashed encrypted data. Experimental results of the proposed system are analyzed and contrasted with the other existent system to show the dominance of the proposed system.
引用
收藏
页数:13
相关论文
共 25 条
[1]  
AKKALKOT J, 2016, INT J COMPUTER SCI M, V5, P235
[2]  
ASWANI PN, 2012, FUZZY KEYWORD SEARCH
[3]   An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter [J].
BalaAnand, M. ;
Karthikeyan, N. ;
Karthik, S. ;
Varatharajan, R. ;
Manogaran, Gunasekaran ;
Sivaparthipan, C. B. .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (09) :6085-6105
[4]  
BalaAnand M., 2017, ADV NAT APPL SCI, V11, P362
[5]   Influence of pin imperfections on the tensile and fatigue behaviour of AA 7075-T6 friction stir lap welds [J].
Balakrishnan, M. ;
Leitao, C. ;
Arruti, E. ;
Aldanondo, E. ;
Rodrigues, D. M. .
INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2018, 97 (5-8) :3129-3139
[6]   Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data [J].
Fu, Zhangjie ;
Wu, Xinle ;
Wang, Qian ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) :2986-2997
[7]  
GANGULI MA, 2017, ADV COMPUTING, V7, P58
[8]  
HAHN C, 2018, WIRELESS PERS COMMUN, P1
[9]  
Li J, 2013, COMPUT INFORM, V32, P723
[10]  
Li J, 2010, IEEE INFOCOM SER