Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Ever since Cloud computing introduced, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing (MRSE). We establish a set of strict privacy requirements for such a secure cloud data utilization system. Among various multi-keyword semantics, we choose the efficient similarity measure of “coordinate matching,†i.e., as many matches as possible, to capture the relevance of data documents to the search query. We further use “inner product similarity†to quantitatively evaluate such similarity measure. We first propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. To improve search experience of the data search service, we further extend these two schemes to support more search semantics. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world data set further show proposed schemes indeed introduce low overhead on computation and communication.
Authors and Affiliations
KandiKattu Balaji Swamy| M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India, K. KISHORE RAJU| ASSISTANT PROFESSOR, Dept. Of Information Technology, S.R.K.R ENGINEERING COLLEGE, A.P., India
The Evolution of Microprocessor Chip: A historic overview of development
In this paper we aredescribing the more interesting segments like, external structure of microprocessor chip(the birth of microprocessor) from silicon element becausemost of IT student does not have knowledge about t...
Green cloud computing: A survey
Green cloud computing is energy oriented distributed networking system with the internet. Now days this cutting edge research topic is highly essential to make the system efficient with environment friendly. Using th...
Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their s...
UPQC Implements The 3-Phase Shunt And Series Active Power Filter To Compensate Current And Voltage Harmonics
This paper presents the three phase shunt and series active power filter in order to reduce the current and voltage harmonics. To implement Unified Power Quality Conditioner (UPQC) control algorithm two control strat...
Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements
The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...