Keyword Binning-Based Efficient Search on Encrypted Cloud Data

被引:0
|
作者
Rohit Handa
C. Rama Krishna
Naveen Aggarwal
机构
[1] National Institute of Technical Teachers Training and Research,CSE Department
[2] UIET,CSE Department
[3] Panjab University,undefined
关键词
Cloud storage; Privacy-preserving; Keyword binning; Searchable encryption; Information retrieval; Multi-keyword; Ranked results; Cipher-text searching;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud provides storage facility to its users at a reduced cost, but storing confidential data on the cloud is a security concern. To provide data privacy, the confidential data are encrypted before outsourcing to the cloud. Storing encrypted data in the cloud affects the utilization of data as it makes document searching inefficient. Although recent research has tried to make searching efficient, still there is a trade-off between the search efficiency and search accuracy. As the cloud is based on the pay-per-use model, more is the time required to retrieve the relevant documents more will be the financial burden on end users which affects their cloud-usage satisfaction. In this paper, the concept of keyword binning is proposed where document indexes are assigned to multiple buckets based on the contained keywords and search is performed only in relevant buckets. So, we use the number of comparisons as one of the metrics as it affects the search time. With ranking incorporated, the retrieved results are ranked efficiently and in 84% of the cases 4 out of the top-5 results of the proposed scheme match the 4 results in top-5 plain-text ranked results. For enhanced query privacy, we also propose an efficient query randomization scheme. The experimental results using Reuters-21578 dataset show that the proposed scheme is privacy-preserving and efficient with 100% recall and 98.45% precision.
引用
收藏
页码:3559 / 3584
页数:25
相关论文
共 50 条
  • [1] Keyword Binning-Based Efficient Search on Encrypted Cloud Data
    Handa, Rohit
    Krishna, C. Rama
    Aggarwal, Naveen
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (04) : 3559 - 3584
  • [2] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [3] EFFICIENT KEYWORD SEARCH ON ENCRYPTED DYNAMIC CLOUD DATA
    Sardar, Laltu
    Sengupta, Binanda
    Ruj, Sushmita
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (05) : 1442 - 1470
  • [4] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422
  • [5] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [6] Efficient Multi-Keyword Fuzzy Search on Encrypted Data in Cloud Storage
    Li, Xiehua
    Cui, Yaping
    Zhou, Maoren
    Zhang, Cao
    Wang, Yanlong
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 288 - 294
  • [7] Efficient keyword search over encrypted data in multi-cloud setting
    Miao, Yinbin
    Liu, Jiajia
    Ma, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3808 - 3820
  • [8] Semantic Keyword Search based on Trie over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Zhang, Daxing
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 59 - 62
  • [9] Approximate Keyword-based Search over Encrypted Cloud Data
    Ibrahim, Ayad
    Jin, Hai
    Yassin, Ali A.
    Zou, Deqing
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 238 - 245
  • [10] Centralized keyword search on encrypted data for cloud applications
    Jiang, Peng
    Mu, Yi
    Guo, Fuchun
    Wang, Xiaofen
    Lai, Jianchang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5064 - 5084