Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. Here, focus on addressing data privacy issues using SSE. For the first time, formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, propose a two-round searchable encryption (TRSE) scheme that supports top-k multi keyword retrieval. In TRSE, employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on cipher text. As a result, information leakage can be eliminated and data security is ensured. Thorough analysis shows that proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE schemes, while correctly realizing the goal of keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.
Authors and Affiliations
Juvairiya K P , Rasheeda Z Khan
Analyzing the Road Traffic and Accidents with Classification Techniques
Data mining is the process of extracting data’s from the database engines. Now a days the road traffic and accidents are main area for the researchers to discover the new problems behind that. It is commonly used in a ma...
Integrating Security and Usability at Requirement Specification Process
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...
Advanced Vehicle Tracking System on Google Earth Using GPS and GSM
Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation sy...
An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uni...
Depth Sensor Based Skeletal Tracking Evaluation for Fall Detection Systems
Falls are very common in elderly due to various physical constraints. Since falls may cause serious injury and even death, fall detection systems are very important, especially when the victim is alone at home or is unab...