Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data

被引:5
|
作者
Sathyabalaji, N. [1 ]
Komarasamy, G. [2 ]
Raja, Daniel Madan S. [3 ]
机构
[1] Bannari Amman Inst Technol, Dept CSE, Sathyamangalam, India
[2] Jain Univ, Dept CSE, Bengaluru, India
[3] Bannari Amman Inst Technol, Dept Informat Technol, Sathyamangalam, India
关键词
cloud computing; cloud server; data owner; data users; hashed encrypted document; index tree; keyword-based search; ALGORITHM;
D O I
10.1002/dac.4274
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing (CC) is the universal area in which the data owners will contract out their pertinent data to the untrusted public cloud that permits the data users to retrieve the data with complete integrity. To give data privacy along with integrity, majority of the research works were concentrated on single data owner for secure searching of encrypted data via the cloud. Also, searchable encryption supports data user to retrieve the particular encrypted document from encrypted cloud data via keyword search (KS). However, these researches are not efficient for keyword search retrieval. To trounce such drawbacks, this paper proposes efficient secure and privacy-preserving keyword search retrieval (SPKSR) system, in which the user retrieves the hashed encrypted documents over hashed encrypted cloud data. The proposed system includes three entities explicitly, (a) data owner (DO), (b) cloud server (CS), and (c) data users (DU). The owner outsources hashed encrypted documents set, along with generated searchable index tree to the CS. The CS hoards the hashed encrypted document collection and index tree structure. DU performs the "search" over the hashed encrypted data. Experimental results of the proposed system are analyzed and contrasted with the other existent system to show the dominance of the proposed system.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
    Zhao, Meng
    Liu, Lingang
    Ding, Yong
    Deng, Hua
    Liang, Hai
    Wang, Huiyong
    Wang, Yujue
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [32] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [33] Approach to keyword search over encrypted data in cloud
    Zhang, Peng
    Li, Yan
    Lin, Hai-Lun
    Yang, Rong
    Liu, Qing-Yun
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 147 - 153
  • [34] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wu, Wei
    Xian, Ming
    Parampalli, Udaya
    Lu, Bin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (02): : 607 - 629
  • [35] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wei Wu
    Ming Xian
    Udaya Parampalli
    Bin Lu
    World Wide Web, 2021, 24 : 607 - 629
  • [36] Dynamic secure multi-keyword ranked search over encrypted cloud data
    Hozhabr, Maryam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [37] Privacy-Preserving Ciphertext-Policy Attribute-Based Search over Encrypted Data in Cloud Storage
    Varri, Uma Sankararao
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2023, 23 (01): : 85 - 87
  • [38] Efficient Privacy Preserving of Multi-keyword Ranked Search Model over Encrypted Cloud Computing
    Mlgheit, Jassim R.
    Houssein, Essam H.
    Zayed, Hala H.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [39] Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
    Yu, Chia-Mu
    Chen, Chi-Yuan
    Chao, Han-Chieh
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 385 - 394
  • [40] Towards efficient privacy-preserving encrypted image search in cloud computing
    Yuan Wang
    Meixia Miao
    Jian Shen
    Jianfeng Wang
    Soft Computing, 2019, 23 : 2101 - 2112